WorldWideScience

Sample records for reducing security risks

  1. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  2. Reducing risks to food security from climate change

    DEFF Research Database (Denmark)

    Campbell, Bruce Morgan; Vermeulen, Sonja Joy; Aggarwal, Pramod

    2016-01-01

    , with very little attention paid to more systems components of cropping, let alone other dimensions of food security. Given the serious threats to food security, attention should shift to an action-oriented research agenda, where we see four key challenges: (a) changing the culture of research; (b) deriving...

  3. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  4. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    OpenAIRE

    Sen-Tarng Lai

    2015-01-01

    E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure ...

  5. NPP physical protection and information security as necessary conditions for reducing nuclear and radiation accident risks

    International Nuclear Information System (INIS)

    Pogosov, O.Yu.; Derevyanko, O.V.

    2017-01-01

    The paper focuses on the fact that nuclear failures and incidents can lead to radioactive contamination of NPP premises. Nuclear and radiation hazard may be caused by malefactors in technological processes when applying computers or inadequate control in case of insufficient level of information security.The researchers performed analysis of factors for reducing risks of nuclear and radiation accidents at NPPs considering specific conditions related to information security of NPP physical protection systems. The paper considers connection of heterogeneous factors that may increase the risk of NPP accidents, possibilities and ways to improve adequate modelling of security of information with limited access directly related to the functioning of automated set of engineering and technical means for NPP physical protection. Within the overall Hutchinson formalization, it is proposed to include additional functional dependencies on indicators specific for NPPs into analysis algorithms.

  6. Regional cooperation to reduce the safety and security risks of Orphan radioactive sources

    International Nuclear Information System (INIS)

    Howard, Geoffrey; Hacker, Celia; Murray, Allan; Romallosa, Kristine; Caseria, Estrella; Africa del Castillo, Lorena

    2008-01-01

    ANSTO's Regional Security of Radioactive Sources (RSRS) Project, in cooperation with the Philippine Nuclear Research Institute (PNRI), has initiated a program to reduce the safety and security risks of orphan radioactive sources in the Philippines. Collaborative work commenced in February 2006 during the Regional Orphan Source Search and Methods Workshop, co-hosted by ANSTO and the US National Nuclear Security Administration. Further professional development activities have occurred following requests by PNRI to ANSTO to support improvements in PNRI's capability and training programs to use a range of radiation survey equipment and on the planning and methods for conducting orphan source searches. The activities, methods and outcomes of the PNRI-ANSTO cooperative program are described, including: i.) Delivering a training workshop which incorporates use of source search and nuclide identification equipment and search methodology; and train-the-trainer techniques for effective development and delivery of custom designed training in the Philippines; ii.) Support and peer review of course work on Orphan Source Search Equipment and Methodology developed by PNRI Fellows; iii.) Supporting the delivery of the inaugural National Training Workshop on Orphan Source Search hosted by PNRI in the Philippines; iv.) Partnering in searching for orphan sources in Luzon, Philippines, in May 2007. The methods employed during these international cooperation activities are establishing a new model of regional engagement that emphasises sustainability of outcomes for safety and security of radioactive sources. (author)

  7. Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk

    Science.gov (United States)

    Gilliam, D. P.; Powell, J. D.

    2002-01-01

    This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.

  8. Computer Security: Improvements Needed to Reduce Risk to Critical Federal Operations and Assets

    National Research Council Canada - National Science Library

    Dacey, Robert

    2001-01-01

    .... Accordingly, the security of these systems and data is essential to avoiding disruptions in critical operations, as well as to helping prevent data tampering, fraud, and inappropriate disclosure...

  9. Simulating the Adaptive Mechanisms to Reduce the Risks of Occurence of Threats to the Economic Security of Enterprise

    Directory of Open Access Journals (Sweden)

    Glushchevsky Vyacheslav V.

    2017-09-01

    Full Text Available The article is concerned with addressing the topical problem of effectively countering real and potential threats to economic security of enterprises and reducing the risks of their occurrence. The article is aimed at simulating the adaptive mechanisms to counteract external influences on the marketing component of enterprise’s economic security and developing a system of measures for removing threats to price destabilization of its orders portfolio based on a modern economic-mathematical instrumentarium. The common causes of the threats occurrence related to the price policy of enterprise and the tactics of the contractual processes with the business partners have been explored. Hidden reserves for price maneuvering in concluding contracts with customers have been identified. An algorithmic model for an adaptive pricing task in terms of an assortment of industrial enterprise has been built. On the basis of this model, mechanisms have been developed to counteract the threats of occurrence and aggravation of a «price conflict» between the producing enterprise and the potential customers of its products, and to advise on how to remove the risks of their occurrence. Prospects for using the methodology together with the instrumentarium for economic-mathematical modeling in terms of tasks of the price risks management have been indicated.

  10. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  11. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  12. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  13. Improving Information Security Risk Management

    Science.gov (United States)

    Singh, Anand

    2009-01-01

    manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…

  14. Health Security and Risk Aversion.

    Science.gov (United States)

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  15. Information security risk analysis

    CERN Document Server

    Peltier, Thomas R

    2001-01-01

    Effective Risk AnalysisQualitative Risk AnalysisValue AnalysisOther Qualitative MethodsFacilitated Risk Analysis Process (FRAP)Other Uses of Qualitative Risk AnalysisCase StudyAppendix A: QuestionnaireAppendix B: Facilitated Risk Analysis Process FormsAppendix C: Business Impact Analysis FormsAppendix D: Sample of ReportAppendix E: Threat DefinitionsAppendix F: Other Risk Analysis OpinionsIndex

  16. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  17. Competition, Speculative Risks, and IT Security Outsourcing

    Science.gov (United States)

    Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan

    Information security management is becoming a more critical and, simultaneously, a challenging function for many firms. Even though many security managers are skeptical about outsourcing of IT security, others have cited reasons that are used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for firms' decisions to outsource IT security. We show that if competitive externalities are ignored, then a firm will outsource security if and only if the MSSP offers a quality (or a cost) advantage over in-house operations, which is consistent with the traditional explanation for security outsourcing. However, a higher quality is neither a prerequisite nor a guarantee for a firm to outsource security. The competitive risk environment and the nature of the security function outsourced, in addition to quality, determine firms' outsourcing decisions. If the reward from the competitor's breach is higher than the loss from own breach, then even if the likelihood of a breach is higher under the MSSP the expected benefit from the competitive demand externality may offset the loss from the higher likelihood of breaches, resulting in one or both firms outsourcing security. The incentive to outsource security monitoring is higher than that of infrastructure management because the MSSP can reduce the likelihood of breach on both firms and thus enhance the demand externality effect. The incentive to outsource security monitoring (infrastructure management) is higher (lower) if either the likelihood of breach on both firms is lower (higher) when security is outsourced or the benefit (relative to loss) from the externality is higher (lower). The benefit from the demand externality arising out of a security breach is higher when more of the customers that leave the breached firm switch to the non-breached firm.

  18. Information Security Risk Analysis

    CERN Document Server

    Peltier, Thomas R

    2010-01-01

    Offers readers with the knowledge and the skill-set needed to achieve a highly effective risk analysis assessment. This title demonstrates how to identify threats and then determine if those threats pose a real risk. It is suitable for industry and academia professionals.

  19. Reducing Risky Security Behaviours: Utilising Affective Feedback to Educate Users

    Directory of Open Access Journals (Sweden)

    Lynsay A. Shepherd

    2014-11-01

    Full Text Available Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rates of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The paper concludes that a solution utilising a browser extension is a suitable method of monitoring potentially risky security behaviour. Ultimately, future work seeks to implement an affective feedback mechanism within the browser extension with the aim of improving security awareness.

  20. reputation Risks through Information Security Incidents

    Directory of Open Access Journals (Sweden)

    Vitaly Eduardovich Dorokhov

    2014-05-01

    Full Text Available The article deals with accounting reputational risks arising through information security breaches in the management of a business entity. Security breach incidents which results to the loss of reputation are identified. Based on this analysis the definition of reputational risk in information security is given.

  1. Security risks arising from portable storage devices

    CSIR Research Space (South Africa)

    Molotsi, K

    2012-10-01

    Full Text Available of the security risks arising from the use of PSDs, and further provides possible security countermeasures to help organisations and users to protect their digital assets. APPROACH Literature review: ? To investigate security risks posed by PSDs... technology in the workplace. International Journal of Electronic Security and Digital Forensics. 3(1): 73?81 [3] Kim, K., Kim, E. & Hong S. (2009). Privacy information protection in portable device. Proceedings of International Conference on Convergence...

  2. Information security risk assessment, aggregation, and mitigation

    NARCIS (Netherlands)

    Lenstra, A.K.; Voss, T.; Wang, H.; Pieprzyk, J.; Varadharajan, V.

    2004-01-01

    As part of their compliance process with the Basel 2 operational risk management requirements, banks must define how they deal with information security risk management. In this paper we describe work in progress on a new quantitative model to assess and aggregate information security risks that is

  3. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  4. Security Risk Assessment in Software Development Projects

    OpenAIRE

    Svendsen, Heidi

    2017-01-01

    Software security is increasing in importance, linearly with vulnerabilities caused by software flaws. It is not possible to spend all the project s resources on software security. To spend the resources given to security in an effective way, one should know what is most important to protect. By performing a risk analysis the project know which vulnerabilities they face. A risk analysis will prioritise the vulnerabilities, and when the vulnerabilities are prioritised the project know where th...

  5. Critical infrastructure cyber-security risk management

    OpenAIRE

    Spyridopoulos, T.; Maraslis, K.; Tryfonas, T.; Oikonomou, G.

    2017-01-01

    Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. Incorrect estimations can lead to errors in the evaluation of risks that can ultimately affect the protection of the system. This issue is also transferred to methods used in Industrial Control Systems (ICSs), as they are mainly...

  6. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  7. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    Science.gov (United States)

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.

  8. Risk assessment techniques for civil aviation security

    Energy Technology Data Exchange (ETDEWEB)

    Tamasi, Galileo, E-mail: g.tamasi@enac.rupa.i [Ente Nazionale per l' Aviazione Civile-Direzione Progetti, Studi e Ricerche, Via di Villa Ricotti, 42, 00161 Roma (Italy); Demichela, Micaela, E-mail: micaela.demichela@polito.i [SAfeR-Centro Studi su Sicurezza, Affidabilita e Rischi, Dipartimento di Scienza dei Materiali e Ingegneria Chimica, Politecnico di Torino, Corso Duca degli Abruzzi, 24, 10129 Torino (Italy)

    2011-08-15

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  9. Risk assessment techniques for civil aviation security

    International Nuclear Information System (INIS)

    Tamasi, Galileo; Demichela, Micaela

    2011-01-01

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  10. Risk and Soviet Security Decisions

    National Research Council Canada - National Science Library

    Hull, Andrew

    1990-01-01

    .... There are several exceptions to general Soviet risk aversion in using military power. But in each instance, the Soviet Union has fared rather badly when it chanced large risks in pursuit of correspondingly high potential gains...

  11. Reducing the risk of nuclear terrorism

    International Nuclear Information System (INIS)

    Hibbs, R.

    2005-01-01

    Full text: The March 2005 'International conference on nuclear security, global directions for the future' noted that nuclear terrorism is one of the greatest threats to society. Eminent members of a multi-national panel stated that there is no one principal activity to reduce the risk of nuclear terrorism and that a combination of activities is required. This paper seeks to identify those activities by analyzing the elements that comprise the risk of nuclear terrorism. For the purpose of the analysis, risk is the product of the probability of a terrorist attack (A p ), the success of a terrorist act (S p ) and the consequence (C) of the attack: R=A p * S p * C. The paper examines each of these three elements of risk with the objective of identifying what we are doing and what else we could be doing to reduce risk. It takes into consideration some historic catastrophes, examines how they might have been prevented or their consequences reduced, and if there are lessons that are applicable to reducing the risk of nuclear terrorism. The paper demonstrates that we have concentrated on only one of the three elements of risk and offer suggestions for diminishing the risk of nuclear terrorism by addressing all the elements. (author)

  12. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  13. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  14. Security risks in IP telephony

    OpenAIRE

    Řezáč, Filip; Vozňák, Miroslav

    2010-01-01

    This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against...

  15. Security Risks in IP Telephony

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  16. Optimal security investments and extreme risk.

    Science.gov (United States)

    Mohtadi, Hamid; Agiwal, Swati

    2012-08-01

    In the aftermath of 9/11, concern over security increased dramatically in both the public and the private sector. Yet, no clear algorithm exists to inform firms on the amount and the timing of security investments to mitigate the impact of catastrophic risks. The goal of this article is to devise an optimum investment strategy for firms to mitigate exposure to catastrophic risks, focusing on how much to invest and when to invest. The latter question addresses the issue of whether postponing a risk mitigating decision is an optimal strategy or not. Accordingly, we develop and estimate both a one-period model and a multiperiod model within the framework of extreme value theory (EVT). We calibrate these models using probability measures for catastrophic terrorism risks associated with attacks on the food sector. We then compare our findings with the purchase of catastrophic risk insurance. © 2012 Society for Risk Analysis.

  17. Vulnerability Identification Errors in Security Risk Assessments

    OpenAIRE

    Taubenberger, Stefan

    2014-01-01

    At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...

  18. Information Security Risk Assessment in Hospitals.

    Science.gov (United States)

    Ayatollahi, Haleh; Shagerdi, Ghazal

    2017-01-01

    To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.

  19. Risk to Water Security on Small Islands

    Science.gov (United States)

    Holding, S. T.; Allen, D. M.

    2013-12-01

    The majority of fresh water available on small islands is shallow groundwater that forms a freshwater lens. Freshwater lenses are generally limited in extent and as such are vulnerable to many stressors that impact water security. These include stressors related to climate change, such as sea level rise, as well as those related to human impacts, such as contamination. Traditionally, water security assessments have focussed on indicators that provide a snapshot of the current condition. However, recent work suggests that in order to effectively manage the water system, it is also important to consider uncertain future impacts to the system by evaluating how different stressors might impact water security. In this study, a framework for assessing risk to water security was developed and tested on Andros Island in The Bahamas. The assessment comprises two main components that characterise the water system: numerical modelling studies and a hazard survey. A baseline numerical model of the freshwater lens throughout Andros Island was developed to simulate the morphology of the freshwater lens and estimate the freshwater resources currently available. The model was prepared using SEAWAT, a density-dependent flow and solute transport code. Various stressors were simulated in the model to evaluate the response of the freshwater lens to predicted future shifts in climate patterns, sea level rise, and changes in water use. A hazard survey was also conducted on the island to collect information related to the storage of contaminants, sanitation infrastructure, waste disposal practices and groundwater abstraction rates. The results of the survey form a geo-spatial database of the location and associated hazards to the freshwater lens. The resulting risk framework provides a ranking of overall risk to water security based on information from the numerical modelling and hazard survey. The risk framework is implemented in a Geographic Information System (GIS) and provides a map

  20. Practical Methods for Information Security Risk Management

    Directory of Open Access Journals (Sweden)

    Cristian AMANCEI

    2011-01-01

    Full Text Available The purpose of this paper is to present some directions to perform the risk man-agement for information security. The article follows to practical methods through question-naire that asses the internal control, and through evaluation based on existing controls as part of vulnerability assessment. The methods presented contains all the key elements that concurs in risk management, through the elements proposed for evaluation questionnaire, list of threats, resource classification and evaluation, correlation between risks and controls and residual risk computation.

  1. INFORMATION SECURITY RISK ASSESSMENT USING EXISTING LEGAL AND METHODOLOGICAL BASE

    Directory of Open Access Journals (Sweden)

    A. I. Trubei

    2015-01-01

    Full Text Available The article provides a survey of the existing regulatory framework for information security riskmanagement. Practical methods for information security risk and vulnerability assessment are proposed.

  2. Risk Analysis and Security Countermeasure Selection

    CERN Document Server

    Norman, Thomas L

    2009-01-01

    Explains how to evaluate the appropriateness of security countermeasures, from a cost-effectiveness perspective. This title guides readers from basic principles to complex processes in a step-by-step fashion, evaluating DHS-approved risk assessment methods, including CARVER, API/NPRA, RAMCAP, and various Sandia methodologies

  3. The Role of Secure Access to Sustainable Energy in Reducing ...

    African Journals Online (AJOL)

    The Role of Secure Access to Sustainable Energy in Reducing Women's ... of poverty, such as low education levels, inadequate health care and limited ... women in relation to energy will help governments promote overall development goals ...

  4. Information Security Risks on a University Campus

    Directory of Open Access Journals (Sweden)

    Amer A. Al-Rawas

    2002-06-01

    Full Text Available This paper is concerned with issues relating to security in the provision of information systems (IS services within a campus environment. It is based on experiences with a specific known environment; namely Sultan Qaboos University. In considering the risks and challenges that face us in the provision of IS services we need to consider a number of interwoven subject areas.  These are: the importance of information to campus communities, the types of information utilised, and the risk factors that relate to the provision of IS services. Based on our discussion of the risk factors identified within this paper, we make a number of recommendations for improving security within any environment that wishes to take the matter seriously. These recommendations are classified into three main groups: general, which are applicable to the entire institution; social, aimed at the work attitudes of staff and students; and technical, addressing the skills and technologies required.

  5. Reducing e-commerce risks using digital certificates

    Directory of Open Access Journals (Sweden)

    Piščević Miloš

    2009-01-01

    Full Text Available E-commerce means buying and selling goods and services across the Internet. Secured communication in e-commerce, across unsecured medium, such as the Internet, represents one of the major components in a domain of providing necessary security- critical demands, so the flow of information could go in a secure way. The Internet, as a global computer network must provide five major security services: confidentiality, data integrity, authentication, availability, and non-repudiation of information. Without guaranteeing aformentioned security goals, risks may be very high in e-commerce systems. A possible way to reduce these risks is to use digital certificates. Digital certificates provide a means of proving identity in electronic transactions, and from the point of view of computer communication they are irreplacable, but nevertheless they provide a good mechanism for implementing the major part of this security goal, and therefore, their usage in e-commerce is the major topic of this paper.

  6. Risk management and security services interaction--a must in today's health care environment.

    Science.gov (United States)

    Stultz, M S

    1990-01-01

    The author shows why risk managers and security directors are natural partners in the effort of a hospital to reduce risks from such occurrences as baby kidnappings, serial killers, thefts, and rapes/sexual assaults.

  7. Towards Agile Security Risk Management in RE and Beyond

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Bakalova, Z.; Tun, Thein Tan; Daneva, Maia

    Little attention has been given so far to the process of security risk management at the early stages of system development. Security has been addressed by isolated security assurance practices, some of which consider risks and mitigations but they do not provide an overview of the overall security

  8. RISK MANAGEMENT FROM THE INFORMATION SECURITY PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Riza Ionuț

    2017-11-01

    Full Text Available Risk management has emerged ever since the appearance of human communities and it has developed at a slow rate. Over time, a significant improvement was made, from accepting hazards to the identification, evaluation and control of unwanted events, threat prevention and exploitation of opportunities through scientific risk management actions. The fundamental role of research in cyber security is to concentrate the efforts on those contexts and conditions which determine the way in which key players reach a common understanding of the way to conceive and eventually answer to certain challenges in cyber security. In order to build a clear perception of these effects, this work presents the main elements which define cyber space, to come to the aid of turning the management process into an efficient one, especially when talking about cyber space as a space for conflicts, both economic and political.

  9. Asset backed securities : risks, ratings and quantitative modelling

    NARCIS (Netherlands)

    Jönsson, B.H.B.; Schoutens, W.

    2009-01-01

    Asset backed securities (ABSs) are structured finance products backed by pools of assets and are created through a securitisation process. The risks in asset backed securities, such as, credit risk, prepayment risk, market risks, operational risk, and legal risks, are directly connected with the

  10. Reducing the risk from radioactive sources

    International Nuclear Information System (INIS)

    MacKenzie, C.

    2006-01-01

    Each year the IAEA receives reports of serious injuries or deaths due to misuse or accidents involving sealed radioactive sources. Sealed radioactive sources are used widely in medicine, industry, and agriculture - by doctors to treat cancer, by radiographers to check welds in pipelines, or by specialists to irradiate food to prevent it from spoiling, for example. If these sources are lost or improperly discarded, a serious accident may result. In addition, the security of sealed sources has become a growing concern, particularly the potential that such a source could be used as a radioactive dispersal device or 'dirty bomb'. Preventing the loss or theft of sealed radioactive sources reduces both the risk of accidents and the risk that such sources could become an instrument of misuse. In most countries, radioactive materials and activities that produce radiation are regulated. Those working with sealed radioactive sources are required not just to have proper credentials, but also the needed training and support to deal with unexpected circumstances that may arise when a source is used. Despite these measures, accidents involving sealed sources continue to be reported to the IAEA. Among its many activities to improve the safety and security of sealed sources, the IAEA has been investigating the root causes of major accidents since the 1980s and publishing the findings so that others can learn from them. This information needs to be in the hands of those whose actions and decisions can reduce accidents by preventing a lost source from making it's way into scrap metal. The IAEA has also developed an international catalogue of sealed radioactive sources, and provides assistance to countries to safely contain sources no longer in use. To raise awareness, a Sealed Radioactive Sources Toolkit was issued that focuses on the long-term issues in safely and securely managing radioactive sealed sources. The target audiences are government agencies, radioactive sealed source

  11. Breastfeeding Reduces Childhood Obesity Risks.

    Science.gov (United States)

    Wang, Liang; Collins, Candice; Ratliff, Melanie; Xie, Bin; Wang, Youfa

    2017-06-01

    The present study examined the effects of breastfeeding and its duration on the development of childhood obesity from 24 months through grade 6. U.S. longitudinal data collected from 1234 children were analyzed using logistic regression models and generalized estimating equation (GEE). Child height and weight were measured six times at ages of 24 months, 36 months, 54 months, grade 1, grade 3, and grade 6. During the early 1990s, prevalence of breastfeeding was low in the United States, 60% and 48% at 1 and 6 months, respectively. Nonsmoking, white, married mothers with both parents in the household, and with income above the poverty line, were more likely to breastfeed at 1 month of age of their babies. Obesity rate of the children increased with age from 24 months to grade 6. Logistic regression showed that breastfeeding at month 1 was associated with 53% (odds ratio [OR]: 0.47, 95% confidence interval [CI]: 0.30-0.73) and 47% (OR: 0.53, 95% CI: 0.36-0.78) decreased risks for childhood obesity at grades 1 and 6, respectively. GEE analysis showed that breastfeeding at 1 month reduced risk for childhood obesity by 36% (95% CI: 0.47-0.88) from ages 24 months through grade 6. Regarding breastfeeding duration, more than 6 months (vs. never) was associated with a decreased risk for childhood obesity by 42% (OR: 0.58, 95% CI: 0.36-0.94). Breastfeeding at 1 month and more than 6 months reduced the risk of childhood obesity. Rate of breastfeeding was low in the United States in the 1990s, which may have had long-term implications on children.

  12. Aviation Security, Risk Assessment, and Risk Aversion for Public Decisionmaking

    Science.gov (United States)

    Stewart, Mark G.; Mueller, John

    2013-01-01

    This paper estimates risk reductions for each layer of security designed to prevent commercial passenger airliners from being commandeered by terrorists, kept under control for some time, and then crashed into specific targets. Probabilistic methods are used to characterize the uncertainty of rates of deterrence, detection, and disruption, as well…

  13. Reducing the threat of RDDs. It's not enough to plug gaps in security systems for radioactive sources. Needed are integrated 'cradle-to-grave' controls to prevent high-risk sources from finding their way into the wrong hands

    International Nuclear Information System (INIS)

    Ferguson, C.D.

    2003-01-01

    Common radioactive materials, such as commercial radioactive sources used in medicine, industry, and scientific research, could fuel radiological dispersal devices (RDDs). While the IAEA has worked toward improving the security of radioactive sources long before the September 11 attacks, the IAEA moved quickly after this date to increase its efforts to prevent these materials from becoming tools of radiological terror. IAEA Director General Elbaradei has spoken often about the need for a 'cradle-to-grave' protection system for radioactive materials. While the IAEA and several Member States have striven to establish such a system, more thinking and work are still required to develop an integrated, layered, and cooperative defense system for radioactive source security. Security improvement should be prioritized on those radioactive sources that pose the greatest security risks. Although perfect security systems do not exist a layered security system should be established. This means that multiple barriers should be in place to lessen the likelihood of a radiological terror act. A summary of the findings of the International Conference on Security of Radioactive sources held in March 2003 is included in this paper

  14. Data security and risk assessment in cloud computing

    Directory of Open Access Journals (Sweden)

    Li Jing

    2018-01-01

    Full Text Available Cloud computing has attracted more and more attention as it reduces the cost of IT infrastructure of organizations. In our country, business Cloud services, such as Alibaba Cloud, Huawei Cloud, QingCloud, UCloud and so on are gaining more and more uses, especially small or median organizations. In the cloud service scenario, the program and data are migrating into cloud, resulting the lack of trust between customers and cloud service providers. However, the recent study on Cloud computing is mainly focused on the service side, while the data security and trust have not been sufficiently studied yet. This paper investigates into the data security issues from data life cycle which includes five steps when an organization uses Cloud computing. A data management framework is given out, including not only the data classification but also the risk management framework. Concretely, the data is divided into two varieties, business and personal information. And then, four classification levels (high, medium, low, normal according to the different extent of the potential adverse effect is introduced. With the help of classification, the administrators can identify the application or data to implement corresponding security controls. At last, the administrators conduct the risk assessment to alleviate the risk of data security. The trust between customers and cloud service providers will be strengthen through this way.

  15. THE MODEL FOR RISK ASSESSMENT ERP-SYSTEMS INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    V. S. Oladko

    2016-12-01

    Full Text Available The article deals with the problem assessment of information security risks in the ERP-system. ERP-system functions and architecture are studied. The model malicious impacts on levels of ERP-system architecture are composed. Model-based risk assessment, which is the quantitative and qualitative approach to risk assessment, built on the partial unification 3 methods for studying the risks of information security - security models with full overlapping technique CRAMM and FRAP techniques developed.

  16. A comprehensive Network Security Risk Model for process control networks.

    Science.gov (United States)

    Henry, Matthew H; Haimes, Yacov Y

    2009-02-01

    The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example.

  17. A Security Risk Measurement for the RAdAC Model

    National Research Council Canada - National Science Library

    Britton, David W; Brown, Ian A

    2007-01-01

    .... The intent is to quantify the risk involved in a single information transaction. Additionally, this thesis will attempt to identify the risk factors involved when calculating the total security risk measurement...

  18. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  19. Video calls from lay bystanders to dispatch centers - risk assessment of information security.

    Science.gov (United States)

    Bolle, Stein R; Hasvold, Per; Henriksen, Eva

    2011-09-30

    Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.

  20. Development of a cyber security risk model using Bayesian networks

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Son, Hanseong; Khalil ur, Rahman; Heo, Gyunyoung

    2015-01-01

    Cyber security is an emerging safety issue in the nuclear industry, especially in the instrumentation and control (I and C) field. To address the cyber security issue systematically, a model that can be used for cyber security evaluation is required. In this work, a cyber security risk model based on a Bayesian network is suggested for evaluating cyber security for nuclear facilities in an integrated manner. The suggested model enables the evaluation of both the procedural and technical aspects of cyber security, which are related to compliance with regulatory guides and system architectures, respectively. The activity-quality analysis model was developed to evaluate how well people and/or organizations comply with the regulatory guidance associated with cyber security. The architecture analysis model was created to evaluate vulnerabilities and mitigation measures with respect to their effect on cyber security. The two models are integrated into a single model, which is called the cyber security risk model, so that cyber security can be evaluated from procedural and technical viewpoints at the same time. The model was applied to evaluate the cyber security risk of the reactor protection system (RPS) of a research reactor and to demonstrate its usefulness and feasibility. - Highlights: • We developed the cyber security risk model can be find the weak point of cyber security integrated two cyber analysis models by using Bayesian Network. • One is the activity-quality model signifies how people and/or organization comply with the cyber security regulatory guide. • Other is the architecture model represents the probability of cyber-attack on RPS architecture. • The cyber security risk model can provide evidence that is able to determine the key element for cyber security for RPS of a research reactor

  1. Security Risks Management in Selected Academic Libraries in Osun ...

    African Journals Online (AJOL)

    The survival of a library depends to a large extent on how secured its collections are. Security of collections constitutes a critical challenge facing academic libraries in Nigeria. It is against this background that this study investigated the security risks management in selected academic libraries in Osun State, Nigeria.

  2. Cyber Safety and Security for Reduced Crew Operations (RCO)

    Science.gov (United States)

    Driscoll, Kevin

    2017-01-01

    NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified. The approach includes a comprehensive safety-hazard analysis of the RCO system to determine top level INFOSEC requirements for RCO and proposes an option for effective RCO implementation. This paper concludes with questioning the economic viability of RCO in light of the expense of overcoming the operational safety and security hazards it would introduce.

  3. Risk Based Security Management at Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  4. Security of Energy Supply - Indicators for Measuring Vulnerability and Risk

    International Nuclear Information System (INIS)

    Heinrich, C.

    2010-01-01

    In an era of increasing globalization, secure and affordable energy supplies are an essential requirement for economies to work, much less develop and grow in the long term. The present study, Energy security of supply - indicators for measuring vulnerability and risk, develops a broad methodical assessment concept to raise awareness among policy makers and the public regarding the vulnerability of energy supplies to potential energy crises. It explores the different aspects of vulnerability, from the primary energy level to energy infrastructure (storage, networks, power plant parks) to the efficiency and cost of energy consumption for end users. The individual characteristics of the formal concept were quantitatively evaluated for several OECD regions (Germany, UK, Sweden, Poland, Italy, France and the US) using a comprehensive empirical database and reduced to a single indicator for assessing energy supply vulnerability. Part of the database comprises historical observations for the period between 1978 and 2007.(author).

  5. Designing a Physical Security System for Risk Reduction in a Hypothetical Nuclear Facility

    International Nuclear Information System (INIS)

    Saleh, A.A.; Abd Elaziz, M.

    2017-01-01

    Physical security in a nuclear facility means detection, prevention and response to threat, the ft, sabotage, unauthorized access and illegal transfer involving radioactive and nuclear material. This paper proposes a physical security system designing concepts to reduce the risk associated with variant threats to a nuclear facility. This paper presents a study of the unauthorized removal and sabotage in a hypothetical nuclear facility considering deter, delay and response layers. More over, the study involves performing any required upgrading to the security system by investigating the nuclear facility layout and considering all physical security layers design to enhance the weakness for risk reduction

  6. Security Risks: Management and Mitigation in the Software Life Cycle

    Science.gov (United States)

    Gilliam, David P.

    2004-01-01

    A formal approach to managing and mitigating security risks in the software life cycle is requisite to developing software that has a higher degree of assurance that it is free of security defects which pose risk to the computing environment and the organization. Due to its criticality, security should be integrated as a formal approach in the software life cycle. Both a software security checklist and assessment tools should be incorporated into this life cycle process and integrated with a security risk assessment and mitigation tool. The current research at JPL addresses these areas through the development of a Sotfware Security Assessment Instrument (SSAI) and integrating it with a Defect Detection and Prevention (DDP) risk management tool.

  7. Reducing the risk, managing safety.

    Science.gov (United States)

    Aldridge, Peter

    2016-02-01

    Fire safety in healthcare premises has always been a challenge to those that discharge this duty. Statutory compliance should be a matter of course, but in an ever increasingly challenged NHS, even this is not a given. While the NHS is driven by managing very complex risk to deliver cutting edge healthcare, providers cannot be risk averse. Which risk, however, takes priority? Here Peter Aldridge, fire and corporate services manager at Leeds Teaching Hospitals NHS Trust, and Secretary to the National Association of Healthcare Fire Officers (NAHFO)--which will this month and next jointly stage fire safety seminars with IHEEM; see page 8--considers the key issues, with input from a fire officer at a leading mental health and community Trust.

  8. Improving organisational resilience through enterprise security risk management.

    Science.gov (United States)

    Petruzzi, John; Loyear, Rachelle

    Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.

  9. Limiting Future Proliferation and Security Risks

    International Nuclear Information System (INIS)

    Bari, R.

    2011-01-01

    A major new technical tool for evaluation of proliferation and security risks has emerged over the past decade as part the activities of the Generation IV International Forum. The tool has been developed by a consensus group from participating countries and organizations and is termed the Proliferation Resistance and Physical Protection (PR and PP) Evaluation Methodology. The methodology defines a set of challenges, analyzes system response to these challenges, and assesses outcomes. The challenges are the threats posed by potential actors (proliferant states or sub-national adversaries). It is of paramount importance in an evaluation to establish the objectives, capabilities, resources, and strategies of the adversary as well as the design and protection contexts. Technical and institutional characteristics are both used to evaluate the response of the system and to determine its resistance against proliferation threats and robustness against sabotage and terrorism threats. The outcomes of the system response are expressed in terms of a set of measures, which thereby define the PR and PP characteristics of the system. This paper summarizes results of applications of the methodology to nuclear energy systems including reprocessing facilities and large and small modular reactors. The use of the methodology in the design phase a facility will be discussed as it applies to future safeguards concepts.

  10. Adaptation to climate change for peace and stability. Strengthening of approaches and instruments as well as promotion of processes to reduce the security risks posed by climate change in the context of climate change adaptation

    Energy Technology Data Exchange (ETDEWEB)

    Taenzler, Dennis; Mohns, Till; Ziegenhagen, Katherina [Adelphi Research, Berlin (Germany)

    2013-10-15

    The findings of the project ''Strengthening of approaches and instruments as well as promotion of processes to reduce the security risks posed by climate change in the context of climate change adaptation'' are summarized in this report. The main objective of the project is to outline the potential contribution of adaptation measures to avoid crisis and conflicts caused or exacerbated by water scarcity, food shortages or extreme weather events. As discussed in the conceptual chapter of the report, adaptation can contribute to peace and stability even in conflict-prone areas given that a conflict-sensitive approach is applied. On the basis of a comprehensive regional analysis, we show that adaptation is not yet a prominent element of regional cooperation. To address this gap, we design three regional adaptation roadmaps for the Andes region, Central and South Asia based on desk review of regional processes and programs as well as expert consultations. To ensure that the results of the projects can be considered in national and international policy processes and to strengthen international governance for adaptation we close with a Memorandum for action outlining major principles to support processes for adaptation and peace. [German] Das Vorhaben ''Entwicklung von Ansaetzen und Instrumenten sowie Foerderung von Prozessen zur Eindaemmung der Sicherheitsrisiken des Klimawandels im Rahmen der Anpassung an den Klimawandel'' untersucht den moeglichen Beitrag, den Massnahmen zur Anpassung an den Klimawandel fuer Frieden und Stabilitaet leisten koennen. Kernanliegen des Vorhabens ist die Vermeidung von durch den Klimawandel erzeugten oder verstaerkten Sicherheitsrisiken wie Wasserknappheit, Nahrungsmittelengpaesse oder extreme Wetterereignisse. Wie die konzeptionelle Eingangsbetrachtung des Endberichts zeigt, koennen Anpassungsprozesse - auch in konfliktgepraegten Gebieten - einen friedensfoerdernden Beitrag leisten, allerdings bedarf es einer konfliktsensitiven Ausrichtung

  11. Adaptation to climate change for peace and stability. Strengthening of approaches and instruments as well as promotion of processes to reduce the security risks posed by climate change in the context of climate change adaptation

    Energy Technology Data Exchange (ETDEWEB)

    Taenzler, Dennis; Mohns, Till; Ziegenhagen, Katherina [Adelphi Research, Berlin (Germany)

    2013-10-15

    The findings of the project ''Strengthening of approaches and instruments as well as promotion of processes to reduce the security risks posed by climate change in the context of climate change adaptation'' are summarized in this report. The main objective of the project is to outline the potential contribution of adaptation measures to avoid crisis and conflicts caused or exacerbated by water scarcity, food shortages or extreme weather events. As discussed in the conceptual chapter of the report, adaptation can contribute to peace and stability even in conflict-prone areas given that a conflict-sensitive approach is applied. On the basis of a comprehensive regional analysis, we show that adaptation is not yet a prominent element of regional cooperation. To address this gap, we design three regional adaptation roadmaps for the Andes region, Central and South Asia based on desk review of regional processes and programs as well as expert consultations. To ensure that the results of the projects can be considered in national and international policy processes and to strengthen international governance for adaptation we close with a Memorandum for action outlining major principles to support processes for adaptation and peace. [German] Das Vorhaben ''Entwicklung von Ansaetzen und Instrumenten sowie Foerderung von Prozessen zur Eindaemmung der Sicherheitsrisiken des Klimawandels im Rahmen der Anpassung an den Klimawandel'' untersucht den moeglichen Beitrag, den Massnahmen zur Anpassung an den Klimawandel fuer Frieden und Stabilitaet leisten koennen. Kernanliegen des Vorhabens ist die Vermeidung von durch den Klimawandel erzeugten oder verstaerkten Sicherheitsrisiken wie Wasserknappheit, Nahrungsmittelengpaesse oder extreme Wetterereignisse. Wie die konzeptionelle Eingangsbetrachtung des Endberichts zeigt, koennen Anpassungsprozesse - auch in konfliktgepraegten Gebieten - einen friedensfoerdernden Beitrag leisten, allerdings bedarf

  12. Potential risks and threats to international security

    Directory of Open Access Journals (Sweden)

    Iurie RICHICINSCHI

    2016-12-01

    Full Text Available Today we can ascertain with certainty that in the early part of the 21st century, the challenges addressed to the current security environment tend to become increasingly diffuse, less predictable and multidimensional, being both a feature of external security, as well as an internal one and, of course, becoming an indispensable part of security policies and strategies. Therefore, the need for international cooperation as a foundation for the stability of the security environment has increased. It should provide a sense of trust and peace by ensuring the absence of danger both for the individual and for the community to which he belongs.

  13. Social Security And Mental Illness: Reducing Disability With Supported Employment

    Science.gov (United States)

    Drake, Robert E.; Skinner, Jonathan S.; Bond, Gary R.; Goldman, Howard H.

    2010-01-01

    Social Security Administration disability programs are expensive, growing, and headed toward bankruptcy. People with psychiatric disabilities now constitute the largest and most rapidly expanding subgroup of program beneficiaries. Evidence-based supported employment is a well-defined, rigorously tested service model that helps people with psychiatric disabilities obtain and succeed in competitive employment. Providing evidence-based supported employment and mental health services to this population could reduce the growing rates of disability and enable those already disabled to contribute positively to the workforce and to their own welfare, at little or no cost (and, depending on assumptions, a possible savings) to the government. PMID:19414885

  14. Reducing O and M risks

    International Nuclear Information System (INIS)

    Patton, D.; LeMaster, D.

    1991-01-01

    This article examines the increasing requirement by investors and financiers of the use of an independent engineer for monitoring the performance of an independent energy project from the conceptual stage through the life span for the term of the loan. The topics include managing the risks from all perspectives, setting expectations, attention to detail. The article also includes a sidebar on loan agreement principles for operational facilities

  15. Effectiveness of Taxicab Security Equipment in Reducing Driver Homicide Rates

    Science.gov (United States)

    Menéndez, Cammie K.C.; Amandus, Harlan E.; Damadi, Parisa; Wu, Nan; Konda, Srinivas; Hendricks, Scott A.

    2015-01-01

    Background Taxicab drivers historically have had one of the highest work-related homicide rates of any occupation. In 2010 the taxicab driver homicide rate was 7.4 per 100,000 drivers, compared to the overall rate of 0.37 per 100,000 workers. Purpose Evaluate the effectiveness of taxicab security cameras and partitions on citywide taxicab driver homicide rates. Methods Taxicab driver homicide rates were compared in 26 major cities in the U.S. licensing taxicabs with security cameras (n=8); bullet-resistant partitions (n=7); and cities where taxicabs were not equipped with either security cameras or partitions (n=11). News clippings of taxicab driver homicides and the number of licensed taxicabs by city were used to construct taxicab driver homicide rates spanning 15 years (1996–2010). Generalized estimating equations were constructed to model the Poisson-distributed homicide rates on city-specific safety equipment installation status, controlling for city homicide rate and the concurrent decline of homicide rates over time. Data were analyzed in 2012. Results Cities with cameras experienced a threefold reduction in taxicab driver homicides compared with control cities (RR=0.27; 95% CI=0.12, 0.61; p=0.002). There was no difference in homicide rates for cities with partitions compared with control cities (RR=1.15; 95% CI=0.80, 1.64; p=0.575). Conclusions Municipal ordinances and company policies mandating security cameras appear to be highly effective in reducing taxicab driver deaths due to workplace violence. PMID:23790983

  16. National security risks? Uncertainty, austerity and other logics of risk in the UK government’s National Security Strategy

    NARCIS (Netherlands)

    Hammerstad, A.; Boas, I.J.C.

    2015-01-01

    Risk scholars within Security Studies have argued that the concept of security has gone through a fundamental transformation away from a threat-based conceptualisation of defence, urgency
    and exceptionality to one of preparedness, precautions and prevention of future risks, some of which are

  17. Security breaches: tips for assessing and limiting your risks.

    Science.gov (United States)

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  18. Context-sensitive Information security Risk identification and evaluation techniques

    NARCIS (Netherlands)

    Ionita, Dan

    2014-01-01

    The objective of my research is to improve and support the process of Information security Risk Assessment by designing a scalable Risk argumentation framework for socio-digital-technical Risk. Due to the various types of IT systems, diversity of architectures and dynamic nature of Risk, there is no

  19. Applications of nuclear safety probabilistic risk assessment to nuclear security for optimized risk mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, S.K.; Harvey, S.B. [Amec Foster Wheeler, Toronto, Ontario (Canada)

    2016-06-15

    Critical infrastructure assets such as nuclear power generating stations are potential targets for malevolent acts. Probabilistic methodologies can be applied to evaluate the real-time security risk based upon intelligence and threat levels. By employing this approach, the application of security forces and other protective measures can be optimized. Existing probabilistic safety analysis (PSA) methodologies and tools employed. in the nuclear industry can be adapted to security applications for this purpose. Existing PSA models can also be adapted and enhanced to consider total plant risk, due to nuclear safety risks as well as security risks. By creating a Probabilistic Security Model (PSM), safety and security practitioners can maximize the safety and security of the plant while minimizing the significant costs associated with security upgrades and security forces. (author)

  20. The new risk paradigm for chemical process security and safety.

    Science.gov (United States)

    Moore, David A

    2004-11-11

    The world of safety and security in the chemical process industries has certainly changed since 11 September, but the biggest challenges may be yet to come. This paper will explain that there is a new risk management paradigm for chemical security, discuss the differences in interpreting this risk versus accidental risk, and identify the challenges we can anticipate will occur in the future on this issue. Companies need to be ready to manage the new chemical security responsibilities and to exceed the expectations of the public and regulators. This paper will outline the challenge and a suggested course of action.

  1. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    Science.gov (United States)

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  2. Reducing greenhouse gas emissions in agriculture without compromising food security?

    Science.gov (United States)

    Frank, Stefan; Havlík, Petr; Soussana, Jean-François; Levesque, Antoine; Valin, Hugo; Wollenberg, Eva; Kleinwechter, Ulrich; Fricko, Oliver; Gusti, Mykola; Herrero, Mario; Smith, Pete; Hasegawa, Tomoko; Kraxner, Florian; Obersteiner, Michael

    2017-10-01

    To keep global warming possibly below 1.5 °C and mitigate adverse effects of climate change, agriculture, like all other sectors, will have to contribute to efforts in achieving net negative emissions by the end of the century. Cost-efficient distribution of mitigation across regions and economic sectors is typically calculated using a global uniform carbon price in climate stabilization scenarios. However, in reality such a carbon price would substantially affect food availability. Here, we assess the implications of climate change mitigation in the land use sector for agricultural production and food security using an integrated partial equilibrium modelling framework and explore ways of relaxing the competition between mitigation in agriculture and food availability. Using a scenario that limits global warming cost-efficiently across sectors to 1.5 °C, results indicate global food calorie losses ranging from 110-285 kcal per capita per day in 2050 depending on the applied demand elasticities. This could translate into a rise in undernourishment of 80-300 million people in 2050. Less ambitious greenhouse gas (GHG) mitigation in the land use sector reduces the associated food security impact significantly, however the 1.5 °C target would not be achieved without additional reductions outside the land use sector. Efficiency of GHG mitigation will also depend on the level of participation globally. Our results show that if non-Annex-I countries decide not to contribute to mitigation action while other parties pursue their mitigation efforts to reach the global climate target, food security impacts in these non-Annex-I countries will be higher than if they participate in a global agreement, as inefficient mitigation increases agricultural production costs and therefore food prices. Land-rich countries with a high proportion of emissions from land use change, such as Brazil, could reduce emissions with only a marginal effect on food availability. In contrast

  3. Evaluating the Security Risks of System Using Hidden Markov Models

    African Journals Online (AJOL)

    System security assessment tools are either restricted to manual risk evaluation methodologies that are not appropriate for real-time application or used to determine the impact of certain events on the security status of networked systems. In this paper, we determine the strength of computer systems from the perspective of ...

  4. Using Financial Instruments to Transfer the Information Security Risks

    Directory of Open Access Journals (Sweden)

    Pankaj Pandey

    2016-05-01

    Full Text Available For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem of information asymmetry, lack of product diversity, illiquidity, high transaction cost, and so on. On the other hand, in theory, capital market-based financial instruments can provide a risk transfer mechanism with the ability to absorb the adverse impact of an information security event. Thus, this article addresses the limitations in the cyber-(reinsurance markets with a set of capital market-based financial instruments. This article presents a set of information security derivatives, namely options, vanilla options, swap, and futures that can be traded at an information security prediction market. Furthermore, this article demonstrates the usefulness of information security derivatives in a given scenario and presents an evaluation of the same in comparison with cyber-insurance. In our analysis, we found that the information security derivatives can at least be a partial solution to the problems in the cyber-insurance markets. The information security derivatives can be used as an effective tool for information elicitation and aggregation, cyber risk pricing, risk hedging, and strategic decision making for information security risk management.

  5. ArgueSecure: Out-of-the-box Risk Assessment

    NARCIS (Netherlands)

    Ionita, Dan; Kegel, Roeland Hendrik,Pieter; Wieringa, Roelf J.; Baltuta, Andrei

    Most established security risk assessment methodologies aim to produce ranked lists of risks. But ranking requires quantification of risks, which in turn relies on data which may not be available or estimations which might not be accurate. As an alternative, we have previously proposed

  6. Information security risk management for ISO27001/ISO27002

    CERN Document Server

    Calder, A; Watkins, S

    2010-01-01

    Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software.

  7. Safety and security risk assessments--now demystified!

    Science.gov (United States)

    White, Donald E

    2011-01-01

    Safety/security risk assessments no longer need to spook nor baffle healthcare safety/security managers. This grid template provides at-at-glance quick lookup of the possible threats, the affected people and things, a priority ranking of these risks, and a workable solution for each risk. Using the standard document, spreadsheet, or graphics software already available on your computer, you can easily use a scientific method to produce professional looking risk assessments that get quickly understood by both senior managers and first responders alike!

  8. The 'polypill' to reduce cardiovascular risk

    DEFF Research Database (Denmark)

    Patel, Vinod; Pedersen, Oluf; Morrissey, John

    2004-01-01

    This article considers data from the Steno-2 multifactorial intervention study in type 2 diabetes to which are applied the United Kingdom Prospective Diabetes Study (UKPDS) risk engine. Mathematical analyses support the use of a 'polypill' to reduce cardiovascular risk in type 2 diabetes. It is s...

  9. Remodeling Strategic Staff Safety and Security Risks Management in Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Sunday S. AKPAN

    2015-10-01

    Full Text Available This paper examined safety and security risk management in tertiary institutions in Nigeria. The frequent attacks at workplace, especially schools, have placed safety and security in the front burner of discussion in both business and political circles. This therefore, forms the imperative for the conduct of this study. The work adopted a cross sectional survey research design and collected data from respondents who are security personnel of the University of Uyo. Analysis of data was done with simple percentage statistics while the research hypotheses were tested with mean and simple regression and correlation statistics. The findings of the study revealed that assassination, kidnappings and bombings were principal risk incidents threatening the safety and security of staff in University of Uyo. A significant positive relationship was found between the funding of security management and workers’ performance. It was discovered specifically that employment screening, regular training of security personnel, regular safety and security meetings and strategic security policy formation were the main strategies for managing safety and security in University of Uyo. The paper concluded that safety and security management and control involves every worker (management and staff of University of Uyo. It was recommended, among others, that management should be more committed to safety and security management in the University by means of making safety and security issues an integral part of University’s strategic plan and also by adopting the management line model – one form of management structure-where safety and security are located, with other general management responsibilities. This way, the resurgent cases of kidnapping, hired assassination, etc. would be reduced if not completely eradicated in the University.

  10. Benefits from reducing risk of death

    Energy Technology Data Exchange (ETDEWEB)

    Krupnick, A

    1994-07-01

    Of the categories of benefits to individuals, reductions in the risk of premature mortality are of central. concern to the public and environmental policy makers. These benefits can include those from reductions in own- risk, for example, an individual's valuation of reducing his or her own mortality risks; reductions in risk to an individual's family, friends, or co-workers (i.e., of people known to the individual); and reductions in risks to unknown individuals. The last type would be an example of altruistic value. The overall goal is to measure the welfare change from a change in the current and/or future probability of dying. The willingness to pay (WTP) reflects the amount of income taken from a person that would leave him or her indifferent to a decrease in risk, whenever it occurs. When this value is divided by the risk change, the resulting value is called the 'value of a statistical life'. Another relevant measure appearing in the literature is the value of life-years saved. A final issue concerns the type of premature mortality risks one is valuing when environmental pollution is at issue. While most effort has gone into estimating the welfare effects of a change in current probability of death of healthy workers on the job, this is more relevant for characterizing the benefits of reducing accidental death risks than death from environmental causes. Exposure to pollutants raises risks of developing cancer, chronic heart, respiratory, and other diseases that raise mortality risks in the future. Such exposure also may raise current death risks for the very old and the sick. But, surely the pollution effect that is analogous to occupational health risks-pollution exposures high enough to raise current risks of death for the healthy, prime-age person-is insignificant in the United States.

  11. Benefits from reducing risk of death

    International Nuclear Information System (INIS)

    Krupnick, A.

    1994-01-01

    Of the categories of benefits to individuals, reductions in the risk of premature mortality are of central. concern to the public and environmental policy makers. These benefits can include those from reductions in own- risk, for example, an individual's valuation of reducing his or her own mortality risks; reductions in risk to an individual's family, friends, or co-workers (i.e., of people known to the individual); and reductions in risks to unknown individuals. The last type would be an example of altruistic value. The overall goal is to measure the welfare change from a change in the current and/or future probability of dying. The willingness to pay (WTP) reflects the amount of income taken from a person that would leave him or her indifferent to a decrease in risk, whenever it occurs. When this value is divided by the risk change, the resulting value is called the 'value of a statistical life'. Another relevant measure appearing in the literature is the value of life-years saved. A final issue concerns the type of premature mortality risks one is valuing when environmental pollution is at issue. While most effort has gone into estimating the welfare effects of a change in current probability of death of healthy workers on the job, this is more relevant for characterizing the benefits of reducing accidental death risks than death from environmental causes. Exposure to pollutants raises risks of developing cancer, chronic heart, respiratory, and other diseases that raise mortality risks in the future. Such exposure also may raise current death risks for the very old and the sick. But, surely the pollution effect that is analogous to occupational health risks-pollution exposures high enough to raise current risks of death for the healthy, prime-age person-is insignificant in the United States

  12. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  13. Evaluating Process Effectiveness to Reduce Risk

    Science.gov (United States)

    Shepherd, Christena C.

    2017-01-01

    It is well documented that government agencies do not have the same incentive as the private sector to focus on process effectiveness and continual improvement of those processes. It is also well documented whenever government agencies fail to deliver efficient, effective, consistent, and fair services to the citizens. In spite of the various "reinventing government" and "effectiveness initiatives" of the past decades, and in spite of the efforts on the part of many agencies to improve, government in general still lags behind industry in creating a culture of effective processes and systems. While the tragic events that unfolded recently in Flint, Michigan, teach us that running government "like a business" does not always take the needs of the citizenry into account, there are many lessons and techniques from the private sector that government agencies can use to improve. The incentive to improve, while mandated by various administrations1, needs to come from within the workforce, in order to effectively take root. The best, most effective incentive is to reduce, control or eliminate risk. Government agencies face some of the same risks as the private sector, while some are unique. While ISO 310002 has been around since 2009, risk has taken on increased visibility within the private sector with the advent of the emphasis on risk-based thinking in ISO 9001:20153. The relationship between risk-based thinking and effective processes is simple and direct. Those processes that are well thought out and standardized (i.e. Plan-Do-Check-Act), will have taken into account the applicable policy, statutory, regulatory, safety, quality and technical parameters, which may not occur to someone performing the process with minimal experience or training; and thus protect the employees, the public and the agency from statutory and regulatory violations; delay in providing services; non-delivery of services; harm to public or employee safety and health; cost overruns; breaches in

  14. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planing assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  15. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planning assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  16. Asset Identification for Security Risk Assessment in Web Applications

    OpenAIRE

    Hisham M. Haddad; Brunil D. Romero

    2009-01-01

    As software applications become more complex they require more security, allowing them to reach an appropriate level of quality to manage information, and therefore achieving business objectives. Web applications represent one segment of software industry where security risk assessment is essential. Web engineering must address new challenges to provide new techniques and tools that guarantee high quality application development. This work focuses asset identification, the initial step in sec...

  17. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  18. Does Metformin Reduce Cancer Risks? Methodologic Considerations.

    Science.gov (United States)

    Golozar, Asieh; Liu, Shuiqing; Lin, Joeseph A; Peairs, Kimberly; Yeh, Hsin-Chieh

    2016-01-01

    The substantial burden of cancer and diabetes and the association between the two conditions has been a motivation for researchers to look for targeted strategies that can simultaneously affect both diseases and reduce their overlapping burden. In the absence of randomized clinical trials, researchers have taken advantage of the availability and richness of administrative databases and electronic medical records to investigate the effects of drugs on cancer risk among diabetic individuals. The majority of these studies suggest that metformin could potentially reduce cancer risk. However, the validity of this purported reduction in cancer risk is limited by several methodological flaws either in the study design or in the analysis. Whether metformin use decreases cancer risk relies heavily on the availability of valid data sources with complete information on confounders, accurate assessment of drug use, appropriate study design, and robust analytical techniques. The majority of the observational studies assessing the association between metformin and cancer risk suffer from methodological shortcomings and efforts to address these issues have been incomplete. Future investigations on the association between metformin and cancer risk should clearly address the methodological issues due to confounding by indication, prevalent user bias, and time-related biases. Although the proposed strategies do not guarantee a bias-free estimate for the association between metformin and cancer, they will reduce synthesis of and reporting of erroneous results.

  19. A surety engineering framework to reduce cognitive systems risks.

    Energy Technology Data Exchange (ETDEWEB)

    Caudell, Thomas P. (University of New Mexico, Albuquerque, NM); Peercy, David Eugene; Caldera, Eva O. (University of New Mexico, Albuquerque, NM); Shaneyfelt, Wendy L.

    2008-12-01

    Cognitive science research investigates the advancement of human cognition and neuroscience capabilities. Addressing risks associated with these advancements can counter potential program failures, legal and ethical issues, constraints to scientific research, and product vulnerabilities. Survey results, focus group discussions, cognitive science experts, and surety researchers concur technical risks exist that could impact cognitive science research in areas such as medicine, privacy, human enhancement, law and policy, military applications, and national security (SAND2006-6895). This SAND report documents a surety engineering framework and a process for identifying cognitive system technical, ethical, legal and societal risks and applying appropriate surety methods to reduce such risks. The framework consists of several models: Specification, Design, Evaluation, Risk, and Maturity. Two detailed case studies are included to illustrate the use of the process and framework. Several Appendices provide detailed information on existing cognitive system architectures; ethical, legal, and societal risk research; surety methods and technologies; and educing information research with a case study vignette. The process and framework provide a model for how cognitive systems research and full-scale product development can apply surety engineering to reduce perceived and actual risks.

  20. RiskREP: Risk-Based Security Requirements Elicitation and Prioritization (extended version)

    NARCIS (Netherlands)

    Herrmann, Andrea; Morali, A.

    2010-01-01

    Today, companies are required to be in control of the security of their IT assets. This is especially challenging in the presence of limited budgets and conflicting requirements. Here, we present Risk-Based Requirements Elicitation and Prioritization (RiskREP), a method for managing IT security

  1. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  2. Information Uncertainty to Compare Qualitative Reasoning Security Risk Assessment Results

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Gregory M [Los Alamos National Laboratory; Key, Brian P [Los Alamos National Laboratory; Zerkle, David K [Los Alamos National Laboratory; Shevitz, Daniel W [Los Alamos National Laboratory

    2009-01-01

    The security risk associated with malevolent acts such as those of terrorism are often void of the historical data required for a traditional PRA. Most information available to conduct security risk assessments for these malevolent acts is obtained from subject matter experts as subjective judgements. Qualitative reasoning approaches such as approximate reasoning and evidential reasoning are useful for modeling the predicted risk from information provided by subject matter experts. Absent from these approaches is a consistent means to compare the security risk assessment results. Associated with each predicted risk reasoning result is a quantifiable amount of information uncertainty which can be measured and used to compare the results. This paper explores using entropy measures to quantify the information uncertainty associated with conflict and non-specificity in the predicted reasoning results. The measured quantities of conflict and non-specificity can ultimately be used to compare qualitative reasoning results which are important in triage studies and ultimately resource allocation. Straight forward extensions of previous entropy measures are presented here to quantify the non-specificity and conflict associated with security risk assessment results obtained from qualitative reasoning models.

  3. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  4. An approach to security risk assessment.

    Science.gov (United States)

    Engells, Thomas E

    2012-01-01

    Use of a brief survey instrument described in this article can be a useful means of obtaining actionable information in regards to risk assessment and crime prevention, the author points out. The survey yields data that assists in the prioritization of effort that can enhance the impact of a limited pool of qualified specialists.

  5. Insuring Life : Value, Security and Risk

    NARCIS (Netherlands)

    Lobo-Guerrero, Luis

    2016-01-01

    This book is a contribution to the scholarly engagement with the wider problem of governing through risk and the politics of uncertainty. It takes life insurance as an empirical site from which to ask: what is the kind of governance created through insurance an instance of, and how does it

  6. Professional Autonomy and Security Risks of Journalists in Colombia

    Directory of Open Access Journals (Sweden)

    Miguel E. Garcés Prettel

    2017-01-01

    Full Text Available This paper analyzes the relationship between professional autonomy and security risks of journalists in Colombia. A correlational-transversal research was conducted with a sample of 751 journalists who filled out the questionnaire “Worlds of Journalism Study”. The results show significant differences on the attacks received by the journalists depending on gender, news beat, region, news media, years of experience, capacity and educational level of journalists. Attacks on journalists correlates positively with the autonomy to publish and write news on governments, armed forces, criminal gangs and structural social problems (poverty, status of ethnic minorities, socioeconomic inequality, environmental damage the latter being a predictor of high risk security.

  7. Risk assessment of climate systems for national security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  8. Reducing cardiovascular risk : protecting the kidney

    NARCIS (Netherlands)

    Dobre, Daniela; Lambers Heerspink, Hiddo J.; de Zeeuw, Dick

    2009-01-01

    Progressive decline of renal function in chronic kidney disease (CKD), measured by a reduced glomerular filtration rate or albuminuria, is linked to an increased risk of cardiovascular (CV) disease. Angiotensin-converting enzyme (ACE) inhibitors and angiotensin II receptor blockers (ARBs), most

  9. Managing Risk, Reducing Vulnerability and Enhancing Productivity ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Managing Risk, Reducing Vulnerability and Enhancing Productivity under a Changing Climate. The countries of the Greater Horn of Africa are particularly vulnerable to drought, exacerbated by widespread poverty and dependence on rainfed agriculture. Even with normal rainfall, the region does not produce enough food to ...

  10. Reducing the Risk of Methadone Overdose

    Centers for Disease Control (CDC) Podcasts

    2012-07-03

    This podcast is based on the July 2012 CDC Vital Signs report. Approximately 14 people die every day of overdoses related to methadone. Listen to learn how to reduce your risk of an overdose.  Created: 7/3/2012 by Centers for Disease Control and Prevention (CDC).   Date Released: 7/3/2012.

  11. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Science.gov (United States)

    2010-01-01

    ... chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information regarding security risk for a chemical facility. (a) Information to determine security risk. In order to...

  12. Secure virtualization: benefits, risks and constraints

    CSIR Research Space (South Africa)

    Carroll, M

    2011-05-01

    Full Text Available Cloud computing is changing the IT delivery model to provide on-demand self-service access to a shared pool of computing resources (physical and virtual) via broad network access to offer reduced costs, scalability, flexibility, capacity utilization...

  13. Warehouse receipts functioning to reduce market risk

    Directory of Open Access Journals (Sweden)

    Jovičić Daliborka

    2014-01-01

    Full Text Available Cereal production underlies the market risk to a great extent due to its elastic demand. Prices of grain have cyclic movements and significant decline in the harvest periods as a result of insufficient supply and high demand. The very specificity of agricultural production leads to the fact that agricultures are forced to sell their products at unfavorable conditions in order to resume production. The Public Warehouses System allows the agriculturers, who were previously unable to use the bank loans to finance the continuation of their production, to efficiently acquire the necessary funds, by the support of the warehouse receipts which serve as collaterals. Based on the results obtained by applying statistical methods (variance and standard deviation, as a measure of market risk under the assumption that warehouse receipts' prices will approximately follow the overall consumer price index, it can be concluded that the warehouse receipts trade will have a significant impact on risk reduction in cereal production. Positive effects can be manifested through the stabilization of prices, reduction of cyclic movements in the production of basic grains and, in the final stage, on the country's food security.

  14. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  15. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo

    2011-01-01

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  16. Risk-based security cost-benefit analysis: method and example applications - 59381

    International Nuclear Information System (INIS)

    Wyss, Gregory; Hinton, John; Clem, John; Silva, Consuelo; Duran, Felicia A.

    2012-01-01

    Document available in abstract form only. Full text of publication follows: Decision makers wish to use risk-based cost-benefit analysis to prioritize security investments. However, understanding security risk requires estimating the likelihood of attack, which is extremely uncertain and depends on unquantifiable psychological factors like dissuasion and deterrence. In addition, the most common performance metric for physical security systems, probability of effectiveness at the design basis threat [P(E)], performs poorly in cost-benefit analysis. It is extremely sensitive to small changes in adversary characteristics when the threat is near a systems breaking point, but very insensitive to those changes under other conditions. This makes it difficult to prioritize investment options on the basis of P(E), especially across multiple targets or facilities. To overcome these obstacles, a Sandia National Laboratories Laboratory Directed Research and Development project has developed a risk-based security cost-benefit analysis method. This approach characterizes targets by how difficult it would be for adversaries to exploit each targets vulnerabilities to induce consequences. Adversaries generally have success criteria (e.g., adequate or desired consequences and thresholds for likelihood of success), and choose among alternative strategies that meet these criteria while considering their degree of difficulty in achieving their successful outcome. Investments reduce security risk as they reduce the severity of consequences available and/or increase the difficulty for an adversary to successfully accomplish their most advantageous attack

  17. Reducing the harms associated with risk assessments

    International Nuclear Information System (INIS)

    Montague, Peter

    2004-01-01

    Risk assessments are the intellectual products of dedicated public health and environmental professionals. Like many other products, risk assessments carry with them the potential for both good and harm. This paper briefly examines some of the harms to which risk assessments have contributed, and then suggests that the legal 'duty to warn' doctrine offers a logical and practical way to reduce some of these harms. The paper suggests concepts that could be incorporated into warnings accompanying every formal risk assessment as routine 'boiler plate' addenda, just as other potentially harmful products, such as lawn mowers and cook stoves, are accompanied by warnings. Finally, the paper briefly examines the 'Code of Ethics and Standards of Practice for Environmental Professionals' (promulgated by the National Association of Environmental Professionals) and shows that the suggested warnings are consistent with recommended practices for environmental professionals

  18. Reducing risks, protecting people. A harmonized approach

    International Nuclear Information System (INIS)

    Foster, R.B.

    2000-01-01

    Risk training, education and communication usually refer to the responsibilities of those who generate risk (e.g. operators of nuclear power plants) towards those who are exposed to the risk (e.g. employees working in the plants and those living in the vicinity). In this context training, education and communication are intended to transfer information from risk professionals to a largely uninformed audience, with a view to improving standards or providing reassurance. However, with the growth of media such as the Internet those to whom such training, education and communication have traditionally been directed are now much better informed. In addition, increasing prosperity affects expectations and prompts questions, not only about the adequacy of the control measures intended to address specific hazards, but also about whether the hazardous activity is justified at all. Within the UK (and Europe) this is very evident for nuclear power, other applications of ionizing radiation, and in other areas such as genetically modified food. In consequence regulators of hazardous activities face considerable new challenges. Of course, regulators still have to formulate standards, communicate them to those responsible for risk reduction and see that the necessary controls are in place. But in addition regulators also have to be able to answer questions such as: - why is this hazardous activity (e.g. a nuclear power plant) allowed at all? - what level of risk is unacceptable? - is the approach to risk reduction sufficiently precautionary? - why shouldn't the risk be reduced further? - why are the risks from certain activities (e.g. those from ionizing radiation) controlled to much lower levels than those from other work activities? - how are decisions made, what criteria are applied and how are the stake holders involves? All this does not make life easy for regulators! The full paper will describe how the Health and Safety Executive (HSE) has responded to these challenges by

  19. Quantitative Security Risk Assessment of Android Permissions and Applications

    OpenAIRE

    Wang , Yang; Zheng , Jun; Sun , Chen; Mukkamala , Srinivas

    2013-01-01

    Part 6: Mobile Computing; International audience; The booming of the Android platform in recent years has attracted the attention of malware developers. However, the permissions-based model used in Android system to prevent the spread of malware, has shown to be ineffective. In this paper, we propose DroidRisk, a framework for quantitative security risk assessment of both Android permissions and applications (apps) based on permission request patterns from benign apps and malware, which aims ...

  20. Risk Reducing Effect of AIS Implementation on Collision Risk

    DEFF Research Database (Denmark)

    Lützen, Marie; Friis-Hansen, Peter

    2003-01-01

    AIS (Automatic Identification System) is a transponder system developed for sea traffic purposes. The system sends and receives important ship information and other safety-related information between other ships and shore-based AIS stations. The implementation of AIS has now been initiated and......, as a result, the community will undoubtedly observe an increase in navigational safety. However, to the authors? knowledge, no study has so far rigorously quantified the risk reducing effect of using AIS as an integrated part of the navigational system. The objective of this study is to fill this gap....... The risk reducing effect of AIS is quantified by building a Bayesian network facilitating an evaluation of the effect of AIS on the navigational officer?s reaction ability in a potential, critical collision situation. The time-dependent change in the risk reducing effect on ship collisions is analysed...

  1. Analyzing State Security Risks in South China Sea Conflict

    Directory of Open Access Journals (Sweden)

    Дмитрий Владимирович Пивоваров

    2009-09-01

    Full Text Available The article is devoted to the regional security issues in South East Asia. The author analyses the international relations that go closely to the foreign policy and foreign policy strategy problems. The author proposes risk analysis as a new and promising method in political science to generate foreign policy plans and analyze international conflicts and problems.

  2. Enterprise Architecture-Based Risk and Security Modelling and Analysis

    NARCIS (Netherlands)

    Jonkers, Henk; Quartel, Dick; Kordy, Barbara; Ekstedt, Mathias; Seong Kim, Deng

    2016-01-01

    The growing complexity of organizations and the increasing number of sophisticated cyber attacks asks for a systematic and integral approach to Enterprise Risk and Security Management (ERSM). As enterprise architecture offers the necessary integral perspective, including the business and IT aspects

  3. Reconciling Malicious and Accidental Risk in Cyber Security

    NARCIS (Netherlands)

    Pieters, Wolter; Lukszo, Zofia; Hadziosmanovic, D.; van den Berg, Jan

    Consider the question whether a cyber security investment is cost-effective. The result will depend on the expected frequency of attacks. Contrary to what is referred to as threat event frequencies or hazard rates in safety risk management, frequencies of targeted attacks are not independent from

  4. Managing climatic risks for enhanced food security: Key information capabilities

    NARCIS (Netherlands)

    Balaghi, R.; Badjeck, M.C.; Bakari, D.; Pauw, de E.D.; Wit, de A.J.W.; Defourny, P.; Donato, S.; Gommes, R.; Jlibene, M.; Ravelo, A.C.; Sivakumar, M.V.K.; Telahigue, N.; Tychon, B.

    2010-01-01

    Food security is expected to face increasing challenges from climatic risks that are more and more exacerbated by climate change, especially in the developing world. This document lists some of the main capabilities that have been recently developed, especially in the area of operational

  5. Agent-Based Modelling for Security Risk Assessment

    NARCIS (Netherlands)

    Janssen, S.A.M.; Sharpans'kykh, Alexei; Bajo, J.; Vale, Z.; Hallenborg, K.; Rocha, A.P.; Mathieu, P.; Pawlewski, P.; Del Val, E.; Novais, P.; Lopes, F.; Duque Méndez, N.D.; Julián, V.; Holmgren, J.

    2017-01-01

    Security Risk Assessment is commonly performed by using traditional methods based on linear probabilistic tools and informal expert judgements. These methods lack the capability to take the inherent dynamic and intelligent nature of attackers into account. To partially address the limitations,

  6. Security Risks and Protection in Online Learning: A Survey

    Science.gov (United States)

    Chen, Yong; He, Wu

    2013-01-01

    This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…

  7. Predictors of mother-child interaction quality and child attachment security in at-risk families.

    Science.gov (United States)

    De Falco, Simona; Emer, Alessandra; Martini, Laura; Rigo, Paola; Pruner, Sonia; Venuti, Paola

    2014-01-01

    Child healthy development is largely influenced by parent-child interaction and a secure parent-child attachment is predictively associated with positive outcomes in numerous domains of child development. However, the parent-child relationship can be affected by several psychosocial and socio-demographic risk factors that undermine its quality and in turn play a negative role in short and long term child psychological health. Prevention and intervention programs that support parenting skills in at-risk families can efficiently reduce the impact of risk factors on mother and child psychological health. This study examines predictors of mother-child interaction quality and child attachment security in a sample of first-time mothers with psychosocial and/or socio-demographic risk factors. Forty primiparous women satisfying specific risk criteria participated in a longitudinal study with their children from pregnancy until 18 month of child age. A multiple psychological and socioeconomic assessment was performed. The Emotional Availability Scales were used to measure the quality of emotional exchanges between mother and child at 12 months and the Attachment Q-Sort served as a measure of child attachment security at 18 months. Results highlight both the effect of specific single factors, considered at a continuous level, and the cumulative risk effect of different co-occurring factors, considered at binary level, on mother-child interaction quality and child attachment security. Implication for the selection of inclusion criteria of intervention programs that support parenting skills in at-risk families are discussed.

  8. Communication in reducing facility siting risk

    International Nuclear Information System (INIS)

    Bisconti, A.S.

    1992-01-01

    Today, social considerations are as important as technical ones in siting new nuclear facilities. Siting any industrial facility has become extremely difficult in this era of not in my backyard (NIMBY). Even if NIMBY does not arise locally, well-organized national opposition groups can be counted on to step in to fan the flames, especially when the industrial facility has to do with anything nuclear. It is now generally recognized that the greatest risk of failure for new nuclear facilities is not technical but social. Applying lessons gained from past experience and social science research can help reduce that risk. From these lessons, six principles for public interaction and communication stand out: (1) create goodwill now; (2) involve the community early; (3) establish the need; (4) communicate controls, not risk; (5) avoid jargon; (6) understand your public

  9. Breach Risk Magnitude: A Quantitative Measure of Database Security.

    Science.gov (United States)

    Yasnoff, William A

    2016-01-01

    A quantitative methodology is described that provides objective evaluation of the potential for health record system breaches. It assumes that breach risk increases with the number of potential records that could be exposed, while it decreases when more authentication steps are required for access. The breach risk magnitude (BRM) is the maximum value for any system user of the common logarithm of the number of accessible database records divided by the number of authentication steps needed to achieve such access. For a one million record relational database, the BRM varies from 5.52 to 6 depending on authentication protocols. For an alternative data architecture designed specifically to increase security by separately storing and encrypting each patient record, the BRM ranges from 1.3 to 2.6. While the BRM only provides a limited quantitative assessment of breach risk, it may be useful to objectively evaluate the security implications of alternative database organization approaches.

  10. Flood Risk Assessment Based On Security Deficit Analysis

    Science.gov (United States)

    Beck, J.; Metzger, R.; Hingray, B.; Musy, A.

    Risk is a human perception: a given risk may be considered as acceptable or unac- ceptable depending on the group that has to face that risk. Flood risk analysis of- ten estimates economic losses from damages, but neglects the question of accept- able/unacceptable risk. With input from land use managers, politicians and other stakeholders, risk assessment based on security deficit analysis determines objects with unacceptable risk and their degree of security deficit. Such a risk assessment methodology, initially developed by the Swiss federal authorities, is illustrated by its application on a reach of the Alzette River (Luxembourg) in the framework of the IRMA-SPONGE FRHYMAP project. Flood risk assessment always involves a flood hazard analysis, an exposed object vulnerability analysis, and an analysis combing the results of these two previous analyses. The flood hazard analysis was done with the quasi-2D hydraulic model FldPln to produce flood intensity maps. Flood intensity was determined by the water height and velocity. Object data for the vulnerability analysis, provided by the Luxembourg government, were classified according to their potential damage. Potential damage is expressed in terms of direct, human life and secondary losses. A thematic map was produced to show the object classification. Protection goals were then attributed to the object classes. Protection goals are assigned in terms of an acceptable flood intensity for a certain flood frequency. This is where input from land use managers and politicians comes into play. The perception of risk in the re- gion or country influences the protection goal assignment. Protection goals as used in Switzerland were used in this project. Thematic maps showing the protection goals of each object in the case study area for a given flood frequency were produced. Com- parison between an object's protection goal and the intensity of the flood that touched the object determine the acceptability of the risk and the

  11. Automated procedure for performing computer security risk analysis

    International Nuclear Information System (INIS)

    Smith, S.T.; Lim, J.J.

    1984-05-01

    Computers, the invisible backbone of nuclear safeguards, monitor and control plant operations and support many materials accounting systems. Our automated procedure to assess computer security effectiveness differs from traditional risk analysis methods. The system is modeled as an interactive questionnaire, fully automated on a portable microcomputer. A set of modular event trees links the questionnaire to the risk assessment. Qualitative scores are obtained for target vulnerability, and qualitative impact measures are evaluated for a spectrum of threat-target pairs. These are then combined by a linguistic algebra to provide an accurate and meaningful risk measure. 12 references, 7 figures

  12. RiskREP : risk-based security requirements elicitation and prioritization

    NARCIS (Netherlands)

    Herrmann, A.; Morali, A.; Etalle, S.; Wieringa, R.J.

    2011-01-01

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement "good-enough security" but need to be able to justify their security investment plans. In this paper, we present a Risk-Based

  13. Cyber Security Risk Assessment for the KNICS Safety Systems

    International Nuclear Information System (INIS)

    Lee, C. K.; Park, G. Y.; Lee, Y. J.; Choi, J. G.; Kim, D. H.; Lee, D. Y.; Kwon, K. C.

    2008-01-01

    In the Korea Nuclear I and C Systems Development (KNICS) project the platforms for plant protection systems are developed, which function as a reactor shutdown, actuation of engineered safety features and a control of the related equipment. Those are fully digitalized through the use of safety-grade programmable logic controllers (PLCs) and communication networks. In 2006 the Regulatory Guide 1.152 (Rev. 02) was published by the U.S. NRC and it describes the application of a cyber security to the safety systems in the Nuclear Power Plant (NPP). Therefore it is required that the new requirements are incorporated into the developed platforms to apply to NPP, and a cyber security risk assessment is performed. The results of the assessment were input for establishing the cyber security policies and planning the work breakdown to incorporate them

  14. Risk assessment for sustainable food security in China according to integrated food security--taking Dongting Lake area for example.

    Science.gov (United States)

    Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan

    2013-06-01

    Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.

  15. Reducing risk where tectonic plates collide

    Science.gov (United States)

    Gomberg, Joan S.; Ludwig, Kristin A.

    2017-06-19

    Most of the world’s earthquakes, tsunamis, landslides, and volcanic eruptions are caused by the continuous motions of the many tectonic plates that make up the Earth’s outer shell. The most powerful of these natural hazards occur in subduction zones, where two plates collide and one is thrust beneath another. The U.S. Geological Survey’s (USGS) “Reducing Risk Where Tectonic Plates Collide—A USGS Plan to Advance Subduction Zone Science” is a blueprint for building the crucial scientific foundation needed to inform the policies and practices that can make our Nation more resilient to subduction zone-related hazards.

  16. AUTOCHTHONOUS APPROACHING IN THE MANAGEMENT OF THE SECURITY RISK

    Directory of Open Access Journals (Sweden)

    Burtescu Emil

    2008-05-01

    Full Text Available An optimal management for a corporation, no matter what size the corporation is, it must contain the management of the security risk. On the importance that is given to the risk management can depend the well functioning of the corporation. An important role in this process has the owner of the business and the way that this one understands the risk. A good understanding of the risk by the owner will have as effect the allocation of sufficient funds to implement controls meant to bring the risk level in order to be an acceptable one. The autochthonous corporations, in a great part even because of the inexistence of reglementations in this domain, have an empiric approach of the phenomena.

  17. Using Financial Instruments to Transfer the Information Security Risks

    OpenAIRE

    Pankaj Pandey; Einar Snekkenes

    2016-01-01

    For many individuals and organizations, cyber-insurance is the most practical and only way of handling a major financial impact of an information security event. However, the cyber-insurance market suffers from the problem of information asymmetry, lack of product diversity, illiquidity, high transaction cost, and so on. On the other hand, in theory, capital market-based financial instruments can provide a risk transfer mechanism with the ability to absorb the adverse impact of an information...

  18. Information security risk management and incompatible parts of organization

    OpenAIRE

    Talabeigi, Elham; Naeeini, Seyyed Gholamreza Jalali

    2016-01-01

    Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in...

  19. Physical security and IT convergence: Managing the cyber-related risks.

    Science.gov (United States)

    McCreight, Tim; Leece, Doug

    The convergence of physical security devices into the corporate network is increasing, due to the perceived economic benefits and efficiencies gained from using one enterprise network. Bringing these two networks together is not without risk. Physical devices like closed circuit television cameras (CCTV), card access readers, and heating, ventilation and air conditioning controllers (HVAC) are typically not secured to the standards we expect for corporate computer networks. These devices can pose significant risks to the corporate network by creating new avenues to exploit vulnerabilities in less-than-secure implementations of physical systems. The ASIS Information Technology Security Council (ITSC) developed a white paper describing steps organisations can take to reduce the risks this convergence can pose, and presented these concepts at the 2015 ASIS/ISC2 Congress in Anaheim, California. 1 This paper expands upon the six characteristics described by ITSC, and provides business continuity planners with information on how to apply these recommendations to physical security devices that use the corporate network.

  20. A review of game theory approach to cyber security risk management

    African Journals Online (AJOL)

    A review of game theory approach to cyber security risk management. ... This paper presents a review of game theoretic-based model for cyber security risk management. Specifically, issues on ... AJOL African Journals Online. HOW TO USE ...

  1. Information security risk management and incompatible parts of organization

    Directory of Open Access Journals (Sweden)

    Elham Talabeigi

    2016-11-01

    Full Text Available Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value:  The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.

  2. Information security risk management and incompatible parts of organization

    Energy Technology Data Exchange (ETDEWEB)

    Talabeigi, E.; Naeeini, S.G.J.

    2016-07-01

    Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value: The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.

  3. Information security risk management and incompatible parts of organization

    International Nuclear Information System (INIS)

    Talabeigi, E.; Naeeini, S.G.J.

    2016-01-01

    Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value: The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.

  4. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in

  5. Cyber security risk assessment for SCADA and DCS networks.

    Science.gov (United States)

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

  6. Communicating Health Risks under Pressure: Homeland Security Applications

    International Nuclear Information System (INIS)

    Garrahan, K.G.; Collie, S.L.

    2006-01-01

    The U.S. Environmental Protection Agency's (EPA) Office of Research and Development (ORD) Threat and Consequence Assessment Division (TCAD) within the National Homeland Security Research Center (NHSRC) has developed a tool for rapid communication of health risks and likelihood of exposure in preparation for terrorist incidents. The Emergency Consequence Assessment Tool (ECAT) is a secure web-based tool designed to make risk assessment and consequence management faster and easier for high priority terrorist threat scenarios. ECAT has been designed to function as 'defensive play-book' for health advisors, first responders, and decision-makers by presenting a series of evaluation templates for priority scenarios that can be modified for site-specific applications. Perhaps most importantly, the risk communication aspect is considered prior to an actual release event, so that management or legal advisors can concur on general risk communication content in preparation for press releases that can be anticipated in case of an actual emergency. ECAT serves as a one-stop source of information for retrieving toxicological properties for agents of concern, estimating exposure to these agents, characterizing health risks, and determining what actions need to be undertaken to mitigate the risks. ECAT has the capability to be used at a command post where inputs can be checked and communicated while the response continues in real time. This front-end planning is intended to fill the gap most commonly identified during tabletop exercises: a need for concise, timely, and informative risk communication to all parties. Training and customization of existing chemical and biological release scenarios with modeling of exposure to air and water, along with custom risk communication 'messages' intended for public, press, shareholders, and other partners enable more effective communication during times of crisis. For DOE, the ECAT could serve as a prototype that would be amenable to

  7. Anticipating Interruptions. Security and risk in a liberalized electricity infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Silvast, A.

    2013-11-01

    During the past ten years, a number of social scientists have emphasized the importance of material infrastructures like electricity supply as a research topic for the social sciences. The developing of such new perspectives concerning infrastructures also includes uncertainties and risks. This research analyzes the management of uncertainties in the Finnish electricity infrastructure by posing the following research question: how are electricity interruptions, or blackouts, anticipated in Finland and how are these interruptions managed as risks? The main research methodology of the work is multi-sited field work. The empirical materials include interviews with experts and lay people (33 interviews); participant observation in two electricity control rooms; an electricity consumer survey (115 respondents); and also a number of infrastructure and security policy documents and observations from electricity security seminars. The materials were primarily gathered between 2004 and 2008. Social science research often links risks with major current social changes or socio-cultural risk perceptions. In recent international social science discussions, however, a new research topic has emerged - those styles of reasoning and techniques of governance that are deployed to manage risk as a practical matter. My study explores these themes empirically by focusing on the specific habitual practices of risk management in the Finnish electricity infrastructure. The work develops various also semi-ethnographic inquiries into infrastructure risk techniques like monitor screening of real-time risks in electricity control rooms; the management of risks in a liberalized electricity market; the emergence of Finnish reasoning about blackouts from a specific historical background; and the ways in which electricity consumers respond to blackouts in their homes. In addition, the work reflects upon the position of a risk researcher in those situations when the research subjects do not define

  8. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

    Science.gov (United States)

    Allodi, Luca; Massacci, Fabio

    2017-08-01

    Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.

  9. Security risks in nuclear waste management: Exceptionalism, opaqueness and vulnerability.

    Science.gov (United States)

    Vander Beken, Tom; Dorn, Nicholas; Van Daele, Stijn

    2010-01-01

    This paper analyses some potential security risks, concerning terrorism or more mundane forms of crime, such as fraud, in management of nuclear waste using a PEST scan (of political, economic, social and technical issues) and some insights of criminologists on crime prevention. Nuclear waste arises as spent fuel from ongoing energy generation or other nuclear operations, operational contamination or emissions, and decommissioning of obsolescent facilities. In international and EU political contexts, nuclear waste management is a sensitive issue, regulated specifically as part of the nuclear industry as well as in terms of hazardous waste policies. The industry involves state, commercial and mixed public-private bodies. The social and cultural dimensions--risk, uncertainty, and future generations--resonate more deeply here than in any other aspect of waste management. The paper argues that certain tendencies in regulation of the industry, claimed to be justified on security grounds, are decreasing transparency and veracity of reporting, opening up invisible spaces for management frauds, and in doing allowing a culture of impunity in which more serious criminal or terrorist risks could arise. What is needed is analysis of this 'exceptional' industry in terms of the normal cannons of risk assessment - a task that this paper begins. Copyright 2009 Elsevier Ltd. All rights reserved.

  10. EPA'S strategy to reduce risk of radon

    International Nuclear Information System (INIS)

    Page, S.

    1993-01-01

    The Indoor Radon Abatement Act of 1988 (IRAA) directed EPA to undertake a variety of activities to address the growing public concern over dangers posed by exposure to indoor radon. Among other requirements, the law directed the Agency to study radon levels, evaluate mitigation methods, establish proficiency programs, assist states with program development, develop training centers, and provide public information. EPA has developed and implemented programs to address each of the key provisions of this statute. This paper presents EPA's broad national strategy to reduce radon risks. It combines and reinforces EPA's basic foundation, including its guiding policies and cooperative partnerships, with an overall management approach and focus for the future. The paper starts with an overview that introduces the strategy's four key elements: underlying policies and scientific principles, a decentralized system of states and other partners for targeting the public, multiple strategies for achieving radon risk reduction, and a strong focus on five key program priorities. This paper then discusses each of these elements in more detail and describes how they interact to guide future efforts and directions of the Agency

  11. Priorities for technology development and policy to reduce the risk from radioactive materials

    International Nuclear Information System (INIS)

    Duggan, Ruth Ann

    2010-01-01

    The Standing Committee on International Security of Radioactive and Nuclear Materials in the Nonproliferation and Arms Control Division conducted its fourth annual workshop in February 2010 on Reducing the Risk from Radioactive and Nuclear Materials. This workshop examined new technologies in real-time tracking of radioactive materials, new risks and policy issues in transportation security, the best practices and challenges found in addressing illicit radioactive materials trafficking, industry leadership in reducing proliferation risk, and verification of the Nuclear Nonproliferation Treaty, Article VI. Technology gaps, policy gaps, and prioritization for addressing the identified gaps were discussed. Participants included academia, policy makers, radioactive materials users, physical security and safeguards specialists, and vendors of radioactive sources and transportation services. This paper summarizes the results of this workshop with the recommendations and calls to action for the Institute of Nuclear Materials Management (INMM) membership community.

  12. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological contract in our...... sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a psychological...

  13. Managing Security Risks in an Industrial Investment – Analysis Directions

    Directory of Open Access Journals (Sweden)

    Stefan Dragomir

    2016-05-01

    Full Text Available This paper achieved an analysis of some important management strategies for an investment, in correlation with index of global pollution. Environmental security assessment shall be determined taking into account the workplace security and effects on health, safety of workers in an industry investment. It is necessary to observe and collect a larger number of data generated by the development of an industrial process, so as to make a deep analysis on global pollution index and how it is affected industrial investment environment. This research shows how can the substances that infest the environment to produce much damage and influence the environmental factors (air, water, soil, landscape, fauna and flora. When we know the risks that characterize the plant equipment, we can protect the life and we can protect the environment for a sustainable development in the future.

  14. [Occupational risks among public safety and security forces].

    Science.gov (United States)

    Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V

    2006-01-01

    The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational

  15. RiskREP: Risk-Based Security Requirements Elicitation and Prioritization

    OpenAIRE

    Herrmann, Andrea; Morali, A.; Etalle, Sandro; Wieringa, Roelf J.; Niedrite, Laila; Strazdina, Renate; Wangler, Benkt

    2011-01-01

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security‿ but need to be able to justify their security investment plans. In this paper, we present a Risk-Based Requirements Prioritization method (RiskREP) that extends misuse case-based methods with IT architecture based risk assessment and countermeasure definition and prioritization. Countermeasure prioritizati...

  16. Predictors of mother-child interaction quality and child attachment security in at-risk families

    Directory of Open Access Journals (Sweden)

    Simona eDe Falco

    2014-08-01

    Full Text Available Child healthy development is largely influenced by parent-child interaction and a secure parent-child attachment is predictively associated with positive outcomes in numerous domains of child development. However, the parent-child relationship can be affected by several psychosocial and socio-demographic risk factors that undermine its quality and in turn play a negative role in short and long term child psychological health. Prevention and intervention programs that support parenting skills in at-risk families can efficiently reduce the impact of risk factors on mother and child psychological health. This study examines predictors of mother-child interaction quality and child attachment security in a sample of first-time mothers with psychosocial and/or socio-demographic risk factors. Forty primiparous women satisfying specific risk criteria participated in a longitudinal study with their children from pregnancy until 18 month of child age. A multiple psychological and socioeconomic assessment was performed. The Emotional Availability Scales were used to measure the quality of emotional exchanges between mother and child at 12 months and the Attachment Q-Sort served as a measure of child attachment security at 18 months. Results highlight both the effect of specific single factors, considered at a continuous level, and the cumulative risk effect of different co-occurring factors, considered at binary level, on mother-child interaction quality and child attachment security. Implication for the selection of inclusion criteria of intervention programs that support parenting skills in at-risk families are discussed.

  17. Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion

    International Nuclear Information System (INIS)

    Lv, Haitao; Yin, Chao; Cui, Zongmin; Zhan, Qin; Zhou, Hongbo

    2015-01-01

    For a security system, the risk assessment is an important method to verdict whether its protection effectiveness is good or not. In this paper, a security system is regarded abstractly as a network by the name of a security network. A security network is made up of security nodes that are abstract functional units with the ability of detecting, delaying and responding. By the use of risk entropy and the Neyman–Pearson criterion, we construct a model to computer the protection probability of any position in the area where a security network is deployed. We provide a solution to find the most vulnerable path of a security network and the protection probability on the path is considered as the risk measure. Finally, we study the effect of some parameters on the risk and the breach protection probability of a security network. Ultimately, we can gain insight about the risk assessment of a security system. - Highlights: • A security system is regarded abstractly as a network made up of security nodes. • We construct a model to computer the protection probability provided by a security network. • We provide a better solution to find the most vulnerable path of a security network. • We build a risk assessment model for a security network based on the most vulnerable path

  18. OpenDBDDAS Toolkit: Secure MapReduce and Hadoop-like Systems

    KAUST Repository

    Fabiano, Enrico

    2015-06-01

    The OpenDBDDAS Toolkit is a software framework to provide support for more easily creating and expanding dynamic big data-driven application systems (DBDDAS) that are common in environmental systems, many engineering applications, disaster management, traffic management, and manufacturing. In this paper, we describe key features needed to implement a secure MapReduce and Hadoop-like system for high performance clusters that guarantees a certain level of privacy of data from other concurrent users of the system. We also provide examples of a secure MapReduce prototype and compare it to another high performance MapReduce, MR-MPI.

  19. Climate change, nuclear risks and nuclear disarmament. From security threats to sustainable peace

    Energy Technology Data Exchange (ETDEWEB)

    Scheffran, Juergen [Hamburg Univ. (Germany). Research Group Climate Change and Security

    2009-07-01

    In the future, nuclear and climate risks may interfere with each other in a mutually enforcing way. Con-flicts induced by climate change could contribute to global insecurity and create more incentives for states to rely on military force, including nuclear weapons. Rather than being a direct cause of war, cli-mate change significantly affects the delicate balance between social and environmental systems in a way that could undermine human security and societal stability with potentially grave consequences for international security. Increased reliance on nuclear energy to reduce carbon emissions will contribute to the risks of nuclear proliferation. A renewed nuclear arms race would consume considerable resources and undermine the conditions for tackling the problem of climate change in a cooperative manner. Nuclear war itself would severely destabilize human societies and the environment, not to speak of the possibility of a nuclear winter that would disrupt the atmosphere. On the other hand, finding solutions to one problem area could help to find solutions in the other. Pre-venting the dangers of climate change and nuclear war requires an integrated set of strategies that ad-dress the causes as well as the impacts on the natural and social environment. Institutions are needed to strengthen common, ecological and human security, build and reinforce conflict-resolution mechanisms and low-carbon energy alternatives, and create sustainable lifecycles that respect the capabilities of the living world. This article examines the linkages between nuclear and climate risks, identifies areas where both threats converge, and offers an approach to move from living under these security threats to building sustain-able peace. By bringing to light the multidimensional interplay between climate change, nuclear risks and nuclear disarmament, this study aims to help the reader grasp their interconnectedness and recognize its critical implications for the strategic security

  20. Climate change, nuclear risks and nuclear disarmament. From security threats to sustainable peace

    International Nuclear Information System (INIS)

    Scheffran, Juergen

    2009-01-01

    In the future, nuclear and climate risks may interfere with each other in a mutually enforcing way. Con-flicts induced by climate change could contribute to global insecurity and create more incentives for states to rely on military force, including nuclear weapons. Rather than being a direct cause of war, cli-mate change significantly affects the delicate balance between social and environmental systems in a way that could undermine human security and societal stability with potentially grave consequences for international security. Increased reliance on nuclear energy to reduce carbon emissions will contribute to the risks of nuclear proliferation. A renewed nuclear arms race would consume considerable resources and undermine the conditions for tackling the problem of climate change in a cooperative manner. Nuclear war itself would severely destabilize human societies and the environment, not to speak of the possibility of a nuclear winter that would disrupt the atmosphere. On the other hand, finding solutions to one problem area could help to find solutions in the other. Pre-venting the dangers of climate change and nuclear war requires an integrated set of strategies that ad-dress the causes as well as the impacts on the natural and social environment. Institutions are needed to strengthen common, ecological and human security, build and reinforce conflict-resolution mechanisms and low-carbon energy alternatives, and create sustainable lifecycles that respect the capabilities of the living world. This article examines the linkages between nuclear and climate risks, identifies areas where both threats converge, and offers an approach to move from living under these security threats to building sustain-able peace. By bringing to light the multidimensional interplay between climate change, nuclear risks and nuclear disarmament, this study aims to help the reader grasp their interconnectedness and recognize its critical implications for the strategic security

  1. Reducing the risk of cyber threats in utilities through log management

    Energy Technology Data Exchange (ETDEWEB)

    Patnaik, A. [ArcSight, Cupertino, CA (United States)

    2010-01-15

    Electrical blackouts caused by terrorists hacking into targeted control systems have already occurred in Brazil. A patchwork of security tools is needed to reduce potential threats. The continuous collection and analysis of data is also needed to detect cyber threats. The real time correlation of logs across all systems, applications and users is needed to ensure the reliability and security of the power grid. Solutions must also integrate well with identity management sources in order to prevent remote access account hijacking. Effective log management can be used to detect threats and reduce the risk of power outages. 1 fig.

  2. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    OpenAIRE

    Jinsoo Shin; Hanseong Son; Gyunyoung Heo

    2017-01-01

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluatio...

  3. RiskREP: Risk-Based Security Requirements Elicitation and Prioritization

    NARCIS (Netherlands)

    Herrmann, Andrea; Morali, A.; Etalle, Sandro; Wieringa, Roelf J.; Niedrite, Laila; Strazdina, Renate; Wangler, Benkt

    2011-01-01

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security‿ but need to be able to justify their security investment plans. In this paper, we present a Risk-Based

  4. Risks and threats of tax state security and methods of their neutralization

    Directory of Open Access Journals (Sweden)

    Y.V. Lebedzevych

    2016-12-01

    Full Text Available The article substantiates the relevance of the study to ensure security of the state tax. Scientists studied different approaches to defining the essence of the concept of "security tax" on the key features that would satisfy the interests of all subjects of tax relations and the necessity of legal consolidation of this concept. Analyzed the economic, social and legal nature of the existence of the security tax, identified key indicators of fiscal security of Ukraine. To determine the effectiveness of the tax administration in the interests of the tax security highlights the main threats, tax security risks caused by external and internal factors, and propose measures for their elimination and prevent the possibility of their occurrence. The stages of tax risk management with effective building security tax, designed structurally-logic of the tax risk management security.

  5. A cooperative model for IS security risk management in distributed environment.

    Science.gov (United States)

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.

  6. Reducing the Risks of Teenage Pregnancy.

    Science.gov (United States)

    Mitchell, M. Faith

    1984-01-01

    Reviews the medical and social risks of teenage pregnancy and describes two successful programs dealing with pregnancy and parenting: the St. Paul Maternal and Infant Care Project in Minnesota and the Teenage Pregnancy and Parenting Project in San Francisco. (SK)

  7. Investing: reducing risks to enhance returns.

    Science.gov (United States)

    West, J; Glickman, S; Seidner, A G

    1996-09-01

    The financial assets of a healthcare organization can present many opportunities for investment. In order to develop a profitable investment program that avoids risky speculation, however, healthcare financial managers must fully understand the nature and risks of their organizations' investments. They must define and monitor their investment objectives, limitations, levels of acceptable risk and policies and conditions through a statement of investment policy and comprehensive investment guidelines.

  8. Consultant tells how to reduce nuclear risk

    International Nuclear Information System (INIS)

    Smock, R.

    1983-01-01

    John Garrick of Pickard, Lowe, and Garrick, an Irvine, CA, consulting firm, thinks nuclear plant risks can be measured and managed through creative use of probabilistic risk assessments (PRA). PRAs can be used to quantify the likelihood of an accident from all causes except sabotage or war, says Garrick. Although that use has been criticized, the Nuclear Regulatory Commission is moving toward formal use of PRAs in its internal analyses. 7 figures, 1 table

  9. Reducing overheating risk using ventilative cooling

    DEFF Research Database (Denmark)

    Heiselberg, Per Kvols

    2014-01-01

    The current trend towards nearly-zero energy buildings has led to an increased risk of overheating throughout the year. Use of the cooling potential of outdoor air can be an energy efficient passive solution to this.......The current trend towards nearly-zero energy buildings has led to an increased risk of overheating throughout the year. Use of the cooling potential of outdoor air can be an energy efficient passive solution to this....

  10. A Dual Perspective on Risks and Security Within Research Assistantships

    Directory of Open Access Journals (Sweden)

    Johannes Petrus Rossouw

    2013-01-01

    Full Text Available Although research assistantships are considered research learning venues in graduate education, there is a scarcity of literature that examines ethical elements attached to the employment of graduate student research assistants or the position of their research supervisors. This article explores the need to implement formal regulations specific to research assistantships in order to increase security and decrease risks for research assistants and research supervisors. Relationships between research assistants and research supervisors have some similarities with regular employment relationships; yet some distinct differences arise due to the educational and developmental nature of research assistantships. The article is written from a dual perspective reflecting the authors’ roles (a research supervisor and a research assistant, respectively and institutional locations (Faculties of Education in South Africa and Canada. The authors draw from existing literature, an analysis of institutional policies and practices at their universities, and their personal and professional experiences to illustrate risks that research assistants and their supervisors may face within research assistantships. They assess the extent to which existing and proposed policies and practices influence working conditions and safeguard experiences within graduate research assistantships. The findings reveal that research assistantships are a unique form of employment focused on educational and professional development that requires specific documentation of expected standards of practice. The authors argue that lack of clear regulations exposes both parties to unnecessary risks and offer recommendations for creating a “Standards of Good Practice” document that will be useful for individuals engaged in research assistantships.

  11. HOW TO CALCULATE INFORMATION VALUE FOR EFFECTIVE SECURITY RISK ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Mario Sajko

    2006-12-01

    Full Text Available The actual problem of information security (infosec risk assessment is determining the value of information property or asset. This is particularly manifested through the use of quantitative methodology in which it is necessary to state the information value in quantitative sizes. The aim of this paper is to describe the evaluation possibilities of business information values, and the criteria needed for determining importance of information. For this purpose, the dimensions of information values will be determined and the ways used to present the importance of information contents will be studied. There are two basic approaches that can be used in evaluation: qualitative and quantitative. Often they are combined to determine forms of information content. The proposed criterion is the three-dimension model, which combines the existing experiences (i.e. possible solutions for information value assessment with our own criteria. An attempt for structuring information value in a business environment will be made as well.

  12. Accident Precursor Analysis and Management: Reducing Technological Risk Through Diligence

    Science.gov (United States)

    Phimister, James R. (Editor); Bier, Vicki M. (Editor); Kunreuther, Howard C. (Editor)

    2004-01-01

    Almost every year there is at least one technological disaster that highlights the challenge of managing technological risk. On February 1, 2003, the space shuttle Columbia and her crew were lost during reentry into the atmosphere. In the summer of 2003, there was a blackout that left millions of people in the northeast United States without electricity. Forensic analyses, congressional hearings, investigations by scientific boards and panels, and journalistic and academic research have yielded a wealth of information about the events that led up to each disaster, and questions have arisen. Why were the events that led to the accident not recognized as harbingers? Why were risk-reducing steps not taken? This line of questioning is based on the assumption that signals before an accident can and should be recognized. To examine the validity of this assumption, the National Academy of Engineering (NAE) undertook the Accident Precursors Project in February 2003. The project was overseen by a committee of experts from the safety and risk-sciences communities. Rather than examining a single accident or incident, the committee decided to investigate how different organizations anticipate and assess the likelihood of accidents from accident precursors. The project culminated in a workshop held in Washington, D.C., in July 2003. This report includes the papers presented at the workshop, as well as findings and recommendations based on the workshop results and committee discussions. The papers describe precursor strategies in aviation, the chemical industry, health care, nuclear power and security operations. In addition to current practices, they also address some areas for future research.

  13. Water security, risk, and economic growth: Insights from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim W.; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2017-08-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been noteworthy in the development of most civilizations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple economic sectors, especially those that are water intensive such as agriculture and energy and (ii) by reducing acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate risks and promote economic growth is widely acknowledged, but prior conceptual work on the relationship between water-related investments and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical systems model of water-related investment, risk, and growth. In cases where initial water security is low, initial investment in water-related assets enables growth. Without such investment, losses due to water-related hazards exert a drag on economic growth and may create a poverty trap. The presence and location of the poverty trap is context-specific and depends on the exposure of productive water-related assets to water-related risk. Exogenous changes in water-related risk can potentially push an economy away from a growth path toward a poverty trap. Our investigation shows that an inverted-U-shaped investment relation between the level of investment in water security and the current level of water security leads to faster rates of growth than the alternatives that we consider here, and that this relation is responsible for the "S"-curve that is posited in the literature. These results illustrate the importance of accounting for environmental and health risks in economic models and offer insights for the design of robust policies for investment in water-related productive assets to manage risk, in the face

  14. OpenDBDDAS Toolkit: Secure MapReduce and Hadoop-like Systems

    KAUST Repository

    Fabiano, Enrico; Seo, Mookwon; Wu, Xiaoban; Douglas, Craig

    2015-01-01

    management, traffic management, and manufacturing. In this paper, we describe key features needed to implement a secure MapReduce and Hadoop-like system for high performance clusters that guarantees a certain level of privacy of data from other concurrent

  15. Failing States as Epidemiologic Risk Zones: Implications for Global Health Security.

    Science.gov (United States)

    Hirschfeld, Katherine

    Failed states commonly experience health and mortality crises that include outbreaks of infectious disease, violent conflict, reductions in life expectancy, and increased infant and maternal mortality. This article draws from recent research in political science, security studies, and international relations to explore how the process of state failure generates health declines and outbreaks of infectious disease. The key innovation of this model is a revised definition of "the state" as a geographically dynamic rather than static political space. This makes it easier to understand how phases of territorial contraction, collapse, and regeneration interrupt public health programs, destabilize the natural environment, reduce human security, and increase risks of epidemic infectious disease and other humanitarian crises. Better understanding of these dynamics will help international health agencies predict and prepare for future health and mortality crises created by failing states.

  16. Threats and risks to information security: a practical analysis of free access wireless networks

    Science.gov (United States)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  17. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  18. Information Security for Business: the Necessity of Reputational Risk Management

    Directory of Open Access Journals (Sweden)

    Vitaly Eduardovich Dorokhov

    2015-06-01

    Full Text Available The article presents the analysis of actual information security problems in commercial segment. The main directions in regulations of the Russian Federation connected with information security assurance are defined. The results indicate the insufficiency of legal regulation in prevention of reputational losses due to information security incidents

  19. Assessing Community Readiness to Reduce Childhood Diarrheal Disease and Improve Food Security in Dioro, Mali

    Directory of Open Access Journals (Sweden)

    Erica C. Borresen

    2016-06-01

    Full Text Available Diarrhea and malnutrition represent leading causes of death for children in Mali. Understanding a community’s needs and ideas are critical to ensure the success of prevention and treatment interventions for diarrheal disease, as well as to improve food security to help reduce malnutrition. The objective of this study was to incorporate the Community Readiness Model (CRM for the issues of childhood diarrheal disease and food security in Mali to measure baseline community readiness prior to any program implementation. Thirteen key respondents residing in Dioro, Mali were selected based on varied social roles and demographics and completed two questionnaires on these public health issues. The overall readiness score to reduce childhood diarrheal disease was 5.75 ± 1.0 standard deviation (preparation stage. The overall readiness score to improve food security was 5.5 ± 0.5 standard deviation (preparation stage. The preparation stage indicates that at least some of the community have basic knowledge regarding these issues, and want to act locally to reduce childhood diarrhea and improve food security and nutrition. Proposed activities to increase community readiness on these issues are provided and are broad enough to allow opportunities to implement community- and culturally-specific activities by the Dioro community.

  20. Information security risk management for computerized health information systems in hospitals: a case study of Iran.

    Science.gov (United States)

    Zarei, Javad; Sadoughi, Farahnaz

    2016-01-01

    In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.

  1. Information security risk management for computerized health information systems in hospitals: a case study of Iran

    Science.gov (United States)

    Zarei, Javad; Sadoughi, Farahnaz

    2016-01-01

    Background In recent years, hospitals in Iran – similar to those in other countries – have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. Materials and methods This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts’ opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Results Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Conclusion Information security risk management is not followed by Iran’s hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran’s Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran. PMID:27313481

  2. Managing to reduce nuclear financial risks

    International Nuclear Information System (INIS)

    Sillin, J.O.

    1984-01-01

    Nuclear power plant projects have weathered volatile economic conditions and uncertain regulatory climates with varying degrees of success. Some electric utilities can point to excellent construction and operating records, while others have suffered continuous difficulties. Are the success stories the result of good luck or effective management. This article identifies the potential sources of financial risk in a nuclear project and describes several methods available to management for controlling financial liability. A commitment to the highest level of technical and managerial skills is cited as a necessary component of all successful nuclear undertakings. 4 references, 3 figures, 2 tables

  3. a review of game theory approach to cyber security risk management

    African Journals Online (AJOL)

    HOD

    Keywords: Cyber Security, Risk Management, Game Theory, Model. 1. INTRODUCTION. Risk is ... behaviors. This implies they are triggered by self- motivated goal .... embrace diligence verification of the recipient of the email as well as lack of ...

  4. Russian spent marine fuel as a global security risk

    International Nuclear Information System (INIS)

    Gussgard, K.; Reistad, O.

    2001-01-01

    Russian marine fuel is a trans-national security concern. This paper focuses on specific technical properties of Russian marine nuclear fuel especially relevant for evaluating different aspects on nuclear proliferation, in addition to risks associated with regional environmental degradation and illegal diversion of radiological substances. Russian fresh fuel for marine reactors has been involved in several significant cases of illicit trafficking of special nuclear materials. The amount and quality of nuclear materials in Russian spent marine fuel give also reason for concern. Not less than 200 marine reactor cores are ready for having their spent fuel unloaded and preliminary stored on shore in the Far East and North West of Russia, and large amounts of spent naval fuel have been stored at Russian military bases for decades. In order to assess the security risks associated with Russian spent marine fuel, this paper discusses the material attractiveness of spent fuel from all types of Russian marine reactors. The calculations are based on a model of a light water moderated Russian icebreaker reactor. The computer tool HELIOS, used for modelling the reactor and the reactor operations, has been extensively qualified by comparisons with experimental data and international benchmark problems for reactor physics codes as well as through feedback from applications. Some of these benchmarks and studies include fuel enrichments up to 90% in Russian marine reactors. Several fuel data cases are discussed in the paper, focusing especially on: 1) early fuel designs with low initial enrichment; 2) more modern fuel designs used in third and fourth generation of Russian submarines probably with intermediate enriched fuel; and 3) marine fuel with initial enrichment levels close to weapons-grade material. In each case the fuel has been burned until k eff has reached below 1. Case 1) has been evaluated, the calculations made as basis for this paper have concentrated on fuel with

  5. The Concepts of Risk, Safety, and Security: Applications in Everyday Language.

    Science.gov (United States)

    Boholm, Max; Möller, Niklas; Hansson, Sven Ove

    2016-02-01

    The concepts of risk, safety, and security have received substantial academic interest. Several assumptions exist about their nature and relation. Besides academic use, the words risk, safety, and security are frequent in ordinary language, for example, in media reporting. In this article, we analyze the concepts of risk, safety, and security, and their relation, based on empirical observation of their actual everyday use. The "behavioral profiles" of the nouns risk, safety, and security and the adjectives risky, safe, and secure are coded and compared regarding lexical and grammatical contexts. The main findings are: (1) the three nouns risk, safety, and security, and the two adjectives safe and secure, have widespread use in different senses, which will make any attempt to define them in a single unified manner extremely difficult; (2) the relationship between the central risk terms is complex and only partially confirms the distinctions commonly made between the terms in specialized terminology; (3) whereas most attempts to define risk in specialized terminology have taken the term to have a quantitative meaning, nonquantitative meanings dominate in everyday language, and numerical meanings are rare; and (4) the three adjectives safe, secure, and risky are frequently used in comparative form. This speaks against interpretations that would take them as absolute, all-or-nothing concepts. © 2015 Society for Risk Analysis.

  6. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Science.gov (United States)

    2010-07-01

    ... requiring a security risk assessment. (a) Citizens and nationals of the United States. A citizen or national... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Individuals not requiring a security risk assessment. 105.11 Section 105.11 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY...

  7. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    Energy Technology Data Exchange (ETDEWEB)

    Jaeger, Calvin Dell; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  8. Nutritional strategies to reduce falls risk in older people.

    Science.gov (United States)

    Nash, Louise; Bergin, Nick

    2018-03-23

    A literature review found an association between increased falls risk and malnutrition, sarcopenia, vitamin D deficiency and dehydration. Strategies to identify, prevent and treat these conditions can help to reduce falls risk in at-risk groups such as frail, older people. Nurses can reduce falls risk in older people by raising awareness of risk factors and embedding nutritional strategies in local falls reduction strategies. ©2018 RCN Publishing Company Ltd. All rights reserved. Not to be copied, transmitted or recorded in any way, in whole or part, without prior permission of the publishers.

  9. FlySec: a risk-based airport security management system based on security as a service concept

    Science.gov (United States)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  10. Reducing sequence risk using trend following and the CAPE ratio

    OpenAIRE

    Clare, A.; Thomas, S.; Smith, P. N.; Seaton, J.

    2017-01-01

    The risk of experiencing bad investment outcomes at the wrong time, or sequence risk, is a poorly understood, but crucial aspect of the risk faced by investors, in particular those in the decumulation phase of their savings journey, typically over the period of retirement financed by a defined contributions pension scheme. Using US equity return data from 1872-2014 we show how this risk can be significantly reduced by applying trend-following investment strategies. We also demonstrate that kn...

  11. Beyond sectors, before the world : Finance, security and risk

    NARCIS (Netherlands)

    Kessler, Oliver

    While security and finance are certainly different social spheres, the fact that we can detect similar shifts in both points to the existence of something that precedes these 'realities'. If finance and security are said to be different, intertwined and related, the question then arises as to what

  12. Risk and business goal based security requirement and countermeasure prioritization

    NARCIS (Netherlands)

    Herrmann, A.; Morali, A.; Etalle, S.; Wieringa, R.J.; Niedrite, L.; Strazdina, R.; Wangler, B.

    2012-01-01

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement "good-enough security" but need to be able to justify their security investment plans. Currently companies achieve this by means of

  13. Management of information security risks in a federal public institution: a case study

    Directory of Open Access Journals (Sweden)

    Jackson Gomes Soares Souza

    2016-11-01

    Full Text Available Public institutions bound to the Brazilian federal public sector must apply security measures, policies, procedures and guidelines as information assets protection measures. This case study sought to determine whether the management of information security risks is applied in a federal public institution according to Information Technology (I.T. managers perceptions and the results expose the importance of the roles played by people, responsibilities, policies, standards, procedures and their implementation aiming greater control of information security risks and opportunities related to information technology security.

  14. Data Security Risk Estimation for Information-Telecommunication Systems on the basis of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Anatoly Valeryevich Tsaregorodtsev

    2014-02-01

    Full Text Available Cloud computing will be one of the most common IT technologies to deploy applications, due to its key features: on-demand network access to a shared pool of configurable computing resources, flexibility and good quality/price ratio. Migrating to cloud architecture enables organizations to reduce the overall cost of implementing and maintaining the infrastructure and reduce development time for new business applications. There are many factors that influence the information security environment of cloud, as its multitenant architecture brings new and more complex problems and vulnerabilities. And the approach to risk estimation used in making decisions about the migration of critical data in the cloud infrastructure of the organization are proposed in the paper.

  15. Risk factors and visual fatigue of baggage X-ray security screeners: a structural equation modelling analysis.

    Science.gov (United States)

    Yu, Rui-Feng; Yang, Lin-Dong; Wu, Xin

    2017-05-01

    This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue using structural equation modelling approach. Two hundred and five X-ray security screeners participated in a questionnaire survey. The result showed that satisfaction with the VDT's physical features and the work environment conditions were negatively correlated with the intensity of visual fatigue, whereas job stress and job burnout had direct positive influences. The path coefficient between the image quality of VDT and visual fatigue was not significant. The total effects of job burnout, job stress, the VDT's physical features and the work environment conditions on visual fatigue were 0.471, 0.469, -0.268 and -0.251 respectively. These findings indicated that both extrinsic factors relating to VDT and workplace environment and psychological factors including job burnout and job stress should be considered in the workplace design and work organisation of security screening tasks to reduce screeners' visual fatigue. Practitioner Summary: This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue. The findings were of great importance to the workplace design and the work organisation of security screening tasks to reduce screeners' visual fatigue.

  16. Evaluating shielding effectiveness for reducing space radiation cancer risks

    International Nuclear Information System (INIS)

    Cucinotta, Francis A.; Kim, Myung-Hee Y.; Ren, Lei

    2006-01-01

    We discuss calculations of probability distribution functions (PDF) representing uncertainties in projecting fatal cancer risk from galactic cosmic rays (GCR) and solar particle events (SPE). The PDFs are used in significance tests for evaluating the effectiveness of potential radiation shielding approaches. Uncertainties in risk coefficients determined from epidemiology data, dose and dose-rate reduction factors, quality factors, and physics models of radiation environments are considered in models of cancer risk PDFs. Competing mortality risks and functional correlations in radiation quality factor uncertainties are included in the calculations. We show that the cancer risk uncertainty, defined as the ratio of the upper value of 95% confidence interval (CI) to the point estimate is about 4-fold for lunar and Mars mission risk projections. For short-stay lunar missions ( 180d) or Mars missions, GCR risks may exceed radiation risk limits that are based on acceptable levels of risk. For example, the upper 95% CI exceeding 10% fatal risk for males and females on a Mars mission. For reducing GCR cancer risks, shielding materials are marginally effective because of the penetrating nature of GCR and secondary radiation produced in tissue by relativistic particles. At the present time, polyethylene or carbon composite shielding cannot be shown to significantly reduce risk compared to aluminum shielding based on a significance test that accounts for radiobiology uncertainties in GCR risk projection

  17. Risk Management in Agriculture for Food Security in Latin America and the Caribbean

    Science.gov (United States)

    Martinez, A.; National Research CouncilScientific; Technological Research (Conicet)

    2013-05-01

    The Americas are extremely important as a unique contributor to Food Security. It provides from tropical to temperate crops. Not only they are able to feed their own population, but contribute significantly to the food supply of the population in developed, emergent and underdeveloped countries. This fact has given the region a unique responsibility to develop a regional risk-management strategy to manage food insecurity at a local, national, regional and global level. Although international agencies such as UN Food and Agriculture Organization (FAO), Instituto Interamericano para la Cooperación en Agricultura (IICA) and the regional centres of the Consultative Group for International Agriculture Research (CGIAR) and the World Bank (WB), are engaged in actions for Risk Management in Agriculture for reducing Food Insecurity. However there is a need to build a framework and/or comprehensive regional strategy for the Americas. It would identify areas for promoting research projects where natural and social science work together for producing relevant scientific information and tools i.e. maps, indicators, models and scenarios, early warning systems, etc. to cooperate with both policy and decision makers in the public and private sectors. This would eventually lead to a comprehensive regional programme for reducing food insecurity. The purpose of International Council for Science-International Research and the International Research for Disaster Risk programme (ICSU-IRDR) and ICSU Regional Office for Latinamerica and the Caribbean (ICSU-ROLAC) is to promote the cooperation of the relevant scientific fields in both natural science and social science in a multi and trans-disciplinary approach on risk management to reduce food insecurity. Also both ICSU-IRDR and ICSU-ROLAC are building a case for the inclusion of the scientific community in the revision of the Hjogo Framework for Action for Disaster Reduction to be held in 2015 as risk management for reducing food

  18. Risk management in obstetrics: how to reduce the risk?

    Directory of Open Access Journals (Sweden)

    Bruno Piras

    2015-10-01

    Full Text Available In this paper the authors examined the most important factors that in the pre-conception period can interfere in the evolution of pregnancy. They also reported a method that since the first trimester of pregnancy is able to identify women at higher risk of developing preeclampsia. Proceedings of the 11th International Workshop on Neonatology and Satellite Meetings · Cagliari (Italy · October 26th-31st, 2015 · From the womb to the adultGuest Editors: Vassilios Fanos (Cagliari, Italy, Michele Mussap (Genoa, Italy, Antonio Del Vecchio (Bari, Italy, Bo Sun (Shanghai, China, Dorret I. Boomsma (Amsterdam, the Netherlands, Gavino Faa (Cagliari, Italy, Antonio Giordano (Philadelphia, USA

  19. Risk and Business Goal Based Security Requirement and Countermeasure Prioritization

    OpenAIRE

    Herrmann, Andrea; Morali, A.; Etalle, Sandro; Wieringa, Roelf J.; Niedrite, Laila; Strazdina, Renate; Wangler, Benkt

    2012-01-01

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security‿ but need to be able to justify their security investment plans. Currently companies achieve this by means of checklist-based security assessments, but these methods are a way to achieve consensus without being able to provide justifications of countermeasures in terms of business goals. But such justificat...

  20. Exploring public perceptions of energy security risks in the UK

    International Nuclear Information System (INIS)

    Demski, Christina; Poortinga, Wouter; Pidgeon, Nick

    2014-01-01

    Along with climate change and affordability, concerns about energy security are key drivers behind proposals for major energy system change in the UK and numerous other countries. Unlike climate change we know very little about how the public thinks and feels about this aspect of sustainability and energy policy. Beyond engaging critically with conceptual and theoretical discussions, empirical data from two surveys (Cardiff postal survey, N=520; online UK survey, N=499) using a ten item energy security scale are presented and discussed. Here we show that aspects of energy security are certainly of concern to the UK public, with particularly high concern around dependence on fossil fuels/imports and relatively lower expressed concern for actual disruption of energy supply. However public concerns around energy security are only emerging, and likely to change depending on the context in which it is discussed (e.g. in comparison to climate change). In addition, findings from public interviews are used to further contextualise the survey findings, showing unfamiliarity among the UK public with regards to the term “energy security”. We discuss implications, and further work that would be useful for understanding public perceptions in more depth. - highlights: • Exploring public views on energy security using a 10 item scale. • Concerns over energy security is relatively high but susceptible to framing. • Patterns of concern for different energy security aspects examined. • The term energy security is unfamiliar, only an emerging concern among UK publics. • Further discussion on the meanings and implications of these perceptions

  1. Reducing cancer risk in rural communities through supermarket interventions.

    Science.gov (United States)

    McCool, Barent N; Lyford, Conrad P; Hensarling, Natalie; Pence, Barbara; McCool, Audrey C; Thapa, Janani; Belasco, Eric; Carter, Tyra M

    2013-09-01

    Cancer risk is high, and prevention efforts are often minimal in rural communities. Feasible means of encouraging lifestyles that will reduce cancer risk for residents of rural communities are needed. This project developed and tested a model that could be feasibly adopted by rural communities to reduce cancer risk. This model focuses on incorporating multi-faceted cancer risk education in the local supermarket. As the supermarket functions both as the primary food source and an information source in small rural communities, the supermarket focus encourages the development of a community environment supportive of lifestyles that should reduce residents' risk for cancer. The actions taken to implement the model and the challenges that communities would have in implementing the model are identified.

  2. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  3. Overseas Risks to China’s Energy Security and Potential Countermeasures

    Directory of Open Access Journals (Sweden)

    Chi Zhang

    2014-12-01

    Full Text Available This article discusses the overseas risks to China’s energy security and provides suggestions for how to safeguard China’s energy security. The key to China’s energy security is supply security. This means obtaining enough and continued energy supply at affordable prices which can be divided into two factors: one is purchasing energy at reasonable prices; the other is having uninterrupted energy import. Accordingly, the major overseas challenges to China’s energy security are the surging international oil prices and the problem of safeguarding energy imports. There are both merits and shortcomings to the energy security concept of realism and that of neo-liberalism. Suggestions for how to secure China’s energy supply should be based on China’s conditions as well as a critique of the two theoretical perspectives and should include three aspects: energy diplomacy, military development and strategic oil reserves.

  4. Airports at Risk: The Impact of Information Sources on Security Decisions

    OpenAIRE

    Kirschenbaum, Avi; Mariani, Michele; Van Gulijk, Coen; Rapaport, Carmit; Lubasz, Sharon

    2012-01-01

    Security decisions in high risk organizations such as airports involve obtaining ongoing and frequent information about potential threats. Utilizing questionnaire survey data from a sample of airport\\ud employees in European Airports across the continent, we analyzed \\ud how both formal and informal sources of security information affect employee's decisions to comply with the security rules and\\ud directives. This led us to trace information network flows to assess its impact on the degree e...

  5. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    Science.gov (United States)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  6. Lethal stakes: rig-hand killings show rising security risks abroad

    International Nuclear Information System (INIS)

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  7. Lethal stakes: rig-hand killings show rising security risks abroad

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  8. Safety Risk Management for Homeland Defense and Security Responders

    National Research Council Canada - National Science Library

    Meyers, Tommey H

    2005-01-01

    .... Coast Guard and the U.S. Navy. This revealed that Operational Risk Management (ORM), a risk-based decision-making tool that systematically balances risk and mission completion, and Crew Resource Management (CRM...

  9. Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

    NARCIS (Netherlands)

    Chockalingam, Sabarathinam; Hadziosmanovic, D.; Pieters, Wolter; Texeira, Andre; van Gelder, Pieter

    2016-01-01

    Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could help to address the corresponding threats by

  10. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  11. Communicating Uncertainty about Climate Change for Application to Security Risk Management

    Science.gov (United States)

    Gulledge, J. M.

    2011-12-01

    The science of climate change has convincingly demonstrated that human activities, including the release of greenhouse gases, land-surface changes, particle emissions, and redistribution of water, are changing global and regional climates. Consequently, key institutions are now concerned about the potential social impacts of climate change. For example, the 2010 Quadrennial Defense Review Report from the U.S. Department of Defense states that "climate change, energy security, and economic stability are inextricably linked." Meanwhile, insured losses from climate and weather-related natural disasters have risen dramatically over the past thirty years. Although these losses stem largely from socioeconomic trends, insurers are concerned that climate change could exacerbate this trend and render certain types of climate risk non-diversifiable. Meanwhile, the climate science community-broadly defined as physical, biological, and social scientists focused on some aspect of climate change-remains largely focused scholarly activities that are valued in the academy but not especially useful to decision makers. On the other hand, climate scientists who engage in policy discussions have generally permitted vested interests who support or oppose climate policies to frame the discussion of climate science within the policy arena. Such discussions focus on whether scientific uncertainties are sufficiently resolved to justify policy and the vested interests overstate or understate key uncertainties to support their own agendas. Consequently, the scientific community has become absorbed defending scientific findings to the near exclusion of developing novel tools to aid in risk-based decision-making. For example, the Intergovernmental Panel on Climate Change (IPCC), established expressly for the purpose of informing governments, has largely been engaged in attempts to reduce unavoidable uncertainties rather than helping the world's governments define a science-based risk

  12. Managing Sensitive Information: DOD Can More Effectively Reduce the Risk of Classification Errors

    National Research Council Canada - National Science Library

    D'Agostino, Davi M; Borseth, Ann; Fenton, Mattias; Hatton, Adam; Hills, Barbara; Keefer, David; Mayfield, David; Reid, Jim; Richardson, Terry; Schwartz, Marc

    2006-01-01

    ...) information security program are increasing the risk of misclassification. DoD's information security program is decentralized to the DoD component level, and the Office of the Under Secretary of Defense for Intelligence (OUSD...

  13. Does retirement reduce the risk of myocardial infarction?

    DEFF Research Database (Denmark)

    Olesen, Kasper; Rugulies, Reiner; Rod, Naja Hulvej

    2014-01-01

    BACKGROUND: Recent studies have suggested that retirement may have beneficial effects on health outcomes. In this study we examined whether the risk of myocardial infarction (MI) was reduced following retirement in a Danish population sample. METHODS: Participants were 617 511 Danish workers, born...... of 1.11 (95% confidence interval: 1.06, 1.16) when comparing retirees with active workers of the same age. CONCLUSIONS: This study does not support the hypothesis that retirement reduces risk of MI. On the contrary, we find that retirement is associated with a modestly increased risk of MI....

  14. Reducing Risk for the Next Generation Nuclear Plant

    Energy Technology Data Exchange (ETDEWEB)

    John M. Beck II; Harold J. Heydt; Emmanuel O. Opare; Kyle B. Oswald

    2010-07-01

    The Next Generation Nuclear Plant (NGNP) Project, managed by the Idaho National Laboratory (INL), is directed by the Energy Policy Act of 2005, to research, develop, design, construct, and operate a prototype forth generation nuclear reactor to meet the needs of the 21st Century. As with all large projects developing and deploying new technologies, the NGNP has numerous risks that need to be identified, tracked, mitigated, and reduced in order for successful project completion. A Risk Management Plan (RMP) was created to outline the process the INL is using to manage the risks and reduction strategies for the NGNP Project. Integral to the RMP is the development and use of a Risk Management System (RMS). The RMS is a tool that supports management and monitoring of the project risks. The RMS does not only contain a risk register, but other functionality that allows decision makers, engineering staff, and technology researchers to review and monitor the risks as the project matures.

  15. Reducing Risk for the Next Generation Nuclear Plant

    International Nuclear Information System (INIS)

    Beck, John M. II; Heydt, Harold J.; Opare, Emmanuel O.; Oswald, Kyle B.

    2010-01-01

    The Next Generation Nuclear Plant (NGNP) Project, managed by the Idaho National Laboratory (INL), is directed by the Energy Policy Act of 2005, to research, develop, design, construct, and operate a prototype forth generation nuclear reactor to meet the needs of the 21st Century. As with all large projects developing and deploying new technologies, the NGNP has numerous risks that need to be identified, tracked, mitigated, and reduced in order for successful project completion. A Risk Management Plan (RMP) was created to outline the process the INL is using to manage the risks and reduction strategies for the NGNP Project. Integral to the RMP is the development and use of a Risk Management System (RMS). The RMS is a tool that supports management and monitoring of the project risks. The RMS does not only contain a risk register, but other functionality that allows decision makers, engineering staff, and technology researchers to review and monitor the risks as the project matures.

  16. Security risks associated with radio frequency identification in medical environments.

    Science.gov (United States)

    Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio

    2012-12-01

    Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.

  17. Functional neural correlates of reduced physiological falls risk

    Directory of Open Access Journals (Sweden)

    Hsu Chun

    2011-08-01

    Full Text Available Abstract Background It is currently unclear whether the function of brain regions associated with executive cognitive processing are independently associated with reduced physiological falls risk. If these are related, it would suggest that the development of interventions targeted at improving executive neurocognitive function would be an effective new approach for reducing physiological falls risk in seniors. Methods We performed a secondary analysis of 73 community-dwelling senior women aged 65 to 75 years old who participated in a 12-month randomized controlled trial of resistance training. Functional MRI data were acquired while participants performed a modified Eriksen Flanker Task - a task of selective attention and conflict resolution. Brain volumes were obtained using MRI. Falls risk was assessed using the Physiological Profile Assessment (PPA. Results After accounting for baseline age, experimental group, baseline PPA score, and total baseline white matter brain volume, baseline activation in the left frontal orbital cortex extending towards the insula was negatively associated with reduced physiological falls risk over the 12-month period. In contrast, baseline activation in the paracingulate gyrus extending towards the anterior cingulate gyrus was positively associated with reduced physiological falls risk. Conclusions Baseline activation levels of brain regions underlying response inhibition and selective attention were independently associated with reduced physiological falls risk. This suggests that falls prevention strategies may be facilitated by incorporating intervention components - such as aerobic exercise - that are specifically designed to induce neurocognitive plasticity. Trial Registration ClinicalTrials.gov Identifier: NCT00426881

  18. AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps

    OpenAIRE

    Chen, Sen; Meng, Guozhu; Su, Ting; Fan, Lingling; Xue, Yinxing; Liu, Yang; Xu, Lihua; Xue, Minhui; Li, Bo; Hao, Shuang

    2018-01-01

    Contemporary financial technology (FinTech) that enables cashless mobile payment has been widely adopted by financial institutions, such as banks, due to its convenience and efficiency. However, FinTech has also made massive and dynamic transactions susceptible to security risks. Given large financial losses caused by such vulnerabilities, regulatory technology (RegTech) has been developed, but more comprehensive security risk assessment is specifically desired to develop robust, scalable, an...

  19. Security risk assessment and protection in the chemical and process industry

    OpenAIRE

    Reniers, Genserik; van Lerberghe, Paul; van Gulijk, Coen

    2014-01-01

    This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical safety. That approach is beneficial for workers in the chemical industry because they recognize the steps in this model from familiar safety models .The model combines the rings-of-protection approach with generic security practices including...

  20. Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

    OpenAIRE

    Chockalingam, Sabarathinam; Hadziosmanovic, Dina; Pieters, Wolter; Teixeira, Andre; van Gelder, Pieter

    2017-01-01

    Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could help to address the corresponding threats by implementing suitable risk treatment plans. However, an overarching overview of these methods, systematizing the characteristics of such methods, is missing. In this paper, we conduct a systematic l...

  1. Security, Privacy, Threats and Risks in Cloud Computing ― A Vital Review

    OpenAIRE

    Goyal, Sumit

    2016-01-01

    Cloud computing is a multi million dollar business. As more and more enterprises are adopting cloud services for their businesses, threat of security has become a big concern for these enterprises and cloud users. This review describes the latest threats and risks associated with cloud computing and suggests techniques for better privacy and security of data in cloud environment. Threats and risks associated with cloud service models (SaaS, PaaS and IaaS) along with cloud deployment models (p...

  2. DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK

    Directory of Open Access Journals (Sweden)

    T. A. Andryianava

    2017-01-01

    Full Text Available Research application of DLP-system for protection of confidential information, a methodology for adapting the DLP-system to the specific activities of the organization, comparative analysis of the results of standard and adapted DLP-systems in the Bank. Developed: a technique for analyzing information security events, algorithm for responding to identified events, methodology and procedures for adapting the standard DLP-system to the specifics of the Bank’s activities. The methodology for adapting a standard DLP-system to the specifics of the Bank’s work consists of the following activities: identification of critical corporate information categories, audit of information systems, description of current risks and their assessment, introduction of rules for Bank’s critical information and setting up a DLP system in accordance with the specifics of the Bank’s work. Modernization of the configuration of a standard DLP-system includes the following procedures: selection of confidential information of the Bank based on membership criteria, setting up detection, creating perimeters and developing an algorithm for responding to identified information security events in the Bank. The algorithm is designed to improve the efficiency of the response of information security officers in cases of incident detection and describes the stages of the subsequent actions. The results of the research prove that using an adapted DLP-system significantly reduces the number of false positives, increasing the accuracy of detecting confidential information and reducing the risk of leakage of critical information outside the corporate network. The application of the adapted DLP-system in the Bank allowed to increase the speed of response of information security specialists to the information security events detected by the DLP-system adapted to the Bank, and also allowed the DLP-system to transition from the copy mode to the blocking mode of illegitimate transfer

  3. The threat nets approach to information system security risk analysis

    NARCIS (Netherlands)

    Mirembe, Drake

    2015-01-01

    The growing demand for healthcare services is motivating hospitals to strengthen outpatient case management using information systems in order to serve more patients using the available resources. Though the use of information systems in outpatient case management raises patient data security

  4. Automated analysis of security requirements through risk-based argumentation

    NARCIS (Netherlands)

    Yu, Yijun; Nunes Leal Franqueira, V.; Tun, Thein Tan; Wieringa, Roelf J.; Nuseibeh, Bashar

    2015-01-01

    Computer-based systems are increasingly being exposed to evolving security threats, which often reveal new vulnerabilities. A formal analysis of the evolving threats is difficult due to a number of practical considerations such as incomplete knowledge about the design, limited information about

  5. Mitigating risks by integrating business continuity and security.

    Science.gov (United States)

    Shaw, Scott; Smith, Nicholas

    2010-11-01

    There has been much discussion regarding the topic of business continuity and security convergence. This paper provides a realistic overview of the union of the two disciplines and offers no/low-cost programme elements that may be used for organisations considering or in the midst of convergence efforts.

  6. Risk and Business Goal Based Security Requirement and Countermeasure Prioritization

    NARCIS (Netherlands)

    Herrmann, Andrea; Morali, A.; Etalle, Sandro; Wieringa, Roelf J.; Niedrite, Laila; Strazdina, Renate; Wangler, Benkt

    Companies are under pressure to be in control of their assets but at the same time they must operate as efficiently as possible. This means that they aim to implement “good-enough security‿ but need to be able to justify their security investment plans. Currently companies achieve this by means of

  7. Secure Multiparty Computation for Cooperative Cyber Risk Assessment

    Science.gov (United States)

    2016-11-01

    that the organizations can compute relevant statistics and analyses on the global infrastructure while still keeping the details of their local...mitigation. In Australasian Conference on Information Security and Privacy, pages 391–401. Springer Berlin Heidelberg, 2004. [5] Fabrizio Smeraldi and Pasquale

  8. Securing Public Safety Vehicles: Reducing Vulnerabilities by Leveraging Smart Technology and Design Strategies

    Science.gov (United States)

    2013-12-01

    there are technologies available today that would reduce the risk of vehicle theft and misuse by fortifying vulnerabilities. They offer several levels...confirm identity by identify “what I am (what I do)” in the electronic context of “who am I?”80 Furthermore, biometrics is a digital representation of...can build a comprehensive and effective biometric identification system, improve overall performance, improve system robustness, and reduce the

  9. National Security and the Accelerating Risks of Climate Change

    Science.gov (United States)

    2014-05-01

    there would be too much. Over the coming decades, projected climate change likely will cause Australia, portions of India , and much of inland China...significant potential water , food, and energy insecurity; political instability; extreme weather events; and other manifestations of climate change ...production, and human sustenance. In light of projected climate change , stresses on the water -food-energy nexus are a mounting security concern

  10. A decision support system for corporations cyber security risk management

    OpenAIRE

    Molina, Gabriela del Rocio Roldan

    2017-01-01

    This thesis presents a decision aiding system named C3-SEC (Contex-aware Corporative Cyber Security), developed in the context of a master program at Polytechnic Institute of Leiria, Portugal. The research dimension and the corresponding software development process that followed are presented and validated with an application scenario and case study performed at Universidad de las Fuerzas Armadas ESPE – Ecuador. C3-SEC is a decision aiding software intended to support cyber ri...

  11. Risk-Based Aviation Security: Diffusion and Acceptance

    Science.gov (United States)

    2012-03-01

    The authors 32 recommended use of DOI for builders of social networking sites to examine the attributes of the model to see how they...November 23, 2011, from http://www.stltoday.com/news/ multimedia /full-body- scanners-arrive-at-lambert-airport/image_898152d8-f8ac-5c61-8fd6...Department of Homeland Security: Progress report on implementation of mission and management functions (GAO-07-454). Retrieved August 31, 2011, from

  12. Opportunities to reduce risk associated with nuclear logging techniques

    International Nuclear Information System (INIS)

    Wraight, P.D.; Robinson, E.; de Fleurieu, R.

    1991-01-01

    Nuclear logging provides petroleum exploration and production companies with data that are critical to their decisions and operations. Because this type data is so important, environmentally conscious well-logging and service companies are constantly reviewing the risks to people and environment associated with nuclear sources with the ALARA (as low as reasonably achievable) principle in mind. Opportunities to additionally reduce risks, which can be accomplished only with the active involvement of oil companies, are proposed in this paper

  13. A review of cyber security risk assessment methods for SCADA systems

    OpenAIRE

    Cherdantseva, Yulia; Burnap, Peter; Blyth, Andrew; Eden, Peter; Jones, Kevin; Soulsby, Hugh; Stoddart, Kristan

    2016-01-01

    This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system. We describe the essence of the methods and then analyse them in terms of aim; application domain; the stages of risk management addressed; key risk management concepts covered; impact measurement; sources of probabilistic data; evaluat...

  14. Breast cancer after bilateral risk-reducing mastectomy

    DEFF Research Database (Denmark)

    Skytte, A-B; Crüger, Dorthe Gylling; Gerster, M

    2011-01-01

    This study aims to evaluate the incidence of breast cancer after risk-reducing mastectomy (RRM) in healthy BRCA mutation carriers. This study is a long-term follow-up of 307 BRCA mutation carriers of whom 96 chose RRM. None of the study participants had a previous history of breast or ovarian...... cancer nor had they undergone RRM or risk-reducing bilateral salpingo-oophorectomy (BSO) prior to the time of BRCA testing. The annual incidence of post-mastectomy breast cancer was 0.8% compared with 1.7% in the non-operated group. Implications of these findings in relation to genetic counseling...

  15. Mitigating flood exposure: Reducing disaster risk and trauma signature.

    Science.gov (United States)

    Shultz, James M; McLean, Andrew; Herberman Mash, Holly B; Rosen, Alexa; Kelly, Fiona; Solo-Gabriele, Helena M; Youngs, Georgia A; Jensen, Jessica; Bernal, Oscar; Neria, Yuval

    2013-01-01

    Introduction. In 2011, following heavy winter snowfall, two cities bordering two rivers in North Dakota, USA faced major flood threats. Flooding was foreseeable and predictable although the extent of risk was uncertain. One community, Fargo, situated in a shallow river basin, successfully mitigated and prevented flooding. For the other community, Minot, located in a deep river valley, prevention was not possible and downtown businesses and one-quarter of the homes were inundated, in the city's worst flood on record. We aimed at contrasting the respective hazards, vulnerabilities, stressors, psychological risk factors, psychosocial consequences, and disaster risk reduction strategies under conditions where flood prevention was, and was not, possible. Methods . We applied the "trauma signature analysis" (TSIG) approach to compare the hazard profiles, identify salient disaster stressors, document the key components of disaster risk reduction response, and examine indicators of community resilience. Results . Two demographically-comparable communities, Fargo and Minot, faced challenging river flood threats and exhibited effective coordination across community sectors. We examined the implementation of disaster risk reduction strategies in situations where coordinated citizen action was able to prevent disaster impact (hazard avoidance) compared to the more common scenario when unpreventable disaster strikes, causing destruction, harm, and distress. Across a range of indicators, it is clear that successful mitigation diminishes both physical and psychological impact, thereby reducing the trauma signature of the event. Conclusion . In contrast to experience of historic flooding in Minot, the city of Fargo succeeded in reducing the trauma signature by way of reducing risk through mitigation.

  16. Indirect risk effects reduce feeding efficiency of ducks during spring.

    Science.gov (United States)

    Behney, Adam C; O'Shaughnessy, Ryan; Eichholz, Michael W; Stafford, Joshua D

    2018-01-01

    Indirect risk effects of predators on prey behavior can have more of an impact on prey populations than direct consumptive effects. Predation risk can elicit more vigilance behavior in prey, reducing the amount of time available for other activities, such as foraging, which could potentially reduce foraging efficiency. Understanding the conditions associated with predation risk and the specific effects predation risk have on prey behavior is important because it has direct influences on the profitability of food items found under various conditions and states of the forager. The goals of this study were to assess how ducks perceived predation risk in various habitat types and how strongly perceived risk versus energetic demand affected foraging behavior. We manipulated food abundance in different wetland types in Illinois, USA to reduce confounding between food abundance and vegetation structure. We conducted focal-animal behavioral samples on five duck species in treatment and control plots and used generalized linear mixed-effects models to compare the effects of vegetation structure versus other factors on the intensity with which ducks fed and the duration of feeding stints. Mallards fed more intensively and, along with blue-winged teal, used longer feeding stints in open habitats, consistent with the hypothesis that limited visibility was perceived to have a greater predation risk than unlimited visibility. The species temporally nearest to nesting, wood ducks, were willing to take more risks for a greater food reward, consistent with an increase in a marginal value of energy as they approached nesting. Our results indicate that some duck species value energy differently based on the surrounding vegetation structure and density. Furthermore, increases in the marginal value of energy can be more influential than perceived risk in shaping foraging behavior patterns. Based on these findings, we conclude that the value of various food items is not solely

  17. MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned

    Science.gov (United States)

    Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran

    2014-01-01

    As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.

  18. Periodontal disease with treatment reduces subsequent cancer risks.

    Science.gov (United States)

    Hwang, Ing-Ming; Sun, Li-Min; Lin, Cheng-Li; Lee, Chun-Feng; Kao, Chia-Hung

    2014-10-01

    The aim of our study was to evaluate the relationship between routine treatment of periodontal disease (PD) and the subsequent risks for cancers in Taiwan. Study participants were selected from the Taiwan National Health Insurance (NHI) system database. The PD with a routine treatment cohort contained 38 902 patients. For each treatment cohort participant, two age- and sex-matched comparison (control) cohort participants were randomly selected. Cox's proportional hazards regression analysis was used to estimate the effects of PD with treatment on the subsequent risk of cancer. The overall risk of developing cancer was significantly lower in the treatment cohort than in the patients without treatment (adjusted Hazard ratio = 0.72, 95% confidence interval = 0.68-0.76). The risks of developing most gastrointestinal tract, lung, gynecological and brain malignancies were significantly lower in the treatment cohort than in the comparison cohort. In contrast, the risks of prostate and thyroid cancers were significantly higher in the treatment cohort than in the comparison cohort. Our findings suggest that PD with treatment is associated with a significantly reduced overall risk of cancer and reduced risks of certain types of cancers. © The Author 2014. Published by Oxford University Press on behalf of the Association of Physicians. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Spent Nuclear Fuel Transportation Risk Assessment Methodology for Homeland Security

    International Nuclear Information System (INIS)

    Teagarden, Grant A.; Canavan, Kenneth T.; Nickell, Robert E.

    2006-01-01

    In response to increased interest in risk-informed decision making regarding terrorism, EPRI was selected by U.S. DHS and ASME to develop and demonstrate a nuclear sector specific methodology for owner / operators to utilize in performing a Risk Analysis and Management for Critical Asset Protection (RAMCAP) assessment for the transportation of spent nuclear fuel (SNF). The objective is to characterize SNF transportation risk for risk management opportunities and to provide consistent information for DHS decision making. The method uses a characterization of risk as a function of Consequence, Vulnerability, and Threat. Worst reasonable case scenarios characterize risk for a benchmark set of threats and consequence types. A trial application was successfully performed and implementation is underway by one utility. (authors)

  20. Security Risk Assessment Process for UAS in the NAS CNPC Architecture

    Science.gov (United States)

    Iannicca, Dennis Christopher; Young, Daniel Paul; Suresh, Thadhani; Winter, Gilbert A.

    2013-01-01

    This informational paper discusses the risk assessment process conducted to analyze Control and Non-Payload Communications (CNPC) architectures for integrating civil Unmanned Aircraft Systems (UAS) into the National Airspace System (NAS). The assessment employs the National Institute of Standards and Technology (NIST) Risk Management framework to identify threats, vulnerabilities, and risks to these architectures and recommends corresponding mitigating security controls. This process builds upon earlier work performed by RTCA Special Committee (SC) 203 and the Federal Aviation Administration (FAA) to roadmap the risk assessment methodology and to identify categories of information security risks that pose a significant impact to aeronautical communications systems. A description of the deviations from the typical process is described in regards to this aeronautical communications system. Due to the sensitive nature of the information, data resulting from the risk assessment pertaining to threats, vulnerabilities, and risks is beyond the scope of this paper

  1. Risk, security and technology: governing football supporters in the twenty-first century

    NARCIS (Netherlands)

    Spaaij, R.

    2013-01-01

    This paper critically examines the security and risk management technologies that are being used to conduct and pre-empt the behaviour of football supporters. It is shown how, in the Netherlands, pre-emptive risk management in the governing of football supporters involves a dispersed and fragmented

  2. A Risk Management Process for Consumers: The Next Step in Information Security

    NARCIS (Netherlands)

    van Cleeff, A.

    2010-01-01

    Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, and awareness programs have limited impact, the only remedy is to develop a risk management process for consumers. Consumers need to

  3. [Strategies for reducing risks in smoking: opportunity or threat].

    Science.gov (United States)

    Córdoba, Rodrigo; Nerín, Isabel

    2009-12-01

    The smoking control policies recommended by the World Health Organisation have achieved a slight decrease in smoking prevalence in the developed countries, although associated mortality is still very high. The use of tobacco products other than cigarettes and even medicinal nicotine (known as nicotine replacement therapy (NRT)) has been proposed as a risk reduction strategy. Among the tobacco products with less individual risk than cigarettes would be any type of tobacco without smoke (smokeless) with a low content in nitrosamines and modified cigarettes; both forms included under the PREP (Potentially Reduced Exposure Products) concept. The idea would be to promote these products among those who cannot quit smoking or wish to reduce their risk without giving up nicotine intake. The possible effects of risk reduction strategies, including PREP, on the decreased prevalence and morbidity and mortality are reviewed, and the possible implications that this measure could have in our country are analysed. Tobacco control measures in Spain are recent and still insufficient. Therefore, the current priority in Spain is the development of policies of control that have shown to more than effective. The marketing and advertising of new tobacco products, even with reduced potential risk, seems more a serious threat than an opportunity for the development of smoking control policies.

  4. Reducing the Risk of Methadone Overdose PSA (:60)

    Centers for Disease Control (CDC) Podcasts

    2012-07-03

    This 60 second PSA is based on the July 2012 CDC Vital Signs report. Approximately 14 people die every day of overdoses related to methadone. Listen to learn how to reduce your risk of an overdose.  Created: 7/3/2012 by Centers for Disease Control and Prevention (CDC).   Date Released: 7/3/2012.

  5. Evaluating the effectiveness of protected areas for maintaining biodiversity, securing habitats, and reducing threats

    DEFF Research Database (Denmark)

    Geldmann, Jonas

    of this thesis has been to evaluate the performance and effectiveness of protected area in securing biodiversity, by evaluating their ability to either improve conservation responses, the state of biodiversity, or alternatively to reduce the human pressures responsible for the loss of biodiversity. The scope......Protected areas are amongst the most important conservation responses to halt the loss of biodiversity and cover more than 12.7% of the terrestrial surface of earth. Likewise, protected areas are an important political instrument and a key component of the Convention for Biological Diversity (CBD......); seeking to protect at least 17% of the terrestrial surface and 10% of the coastal and marine areas by 2020. Protected areas are expected to deliver on many different objectives covering biodiversity, climate change mitigation, local livelihood, and cultural & esthetic values. Within each...

  6. National security and the accelerating risk of climate change

    Directory of Open Access Journals (Sweden)

    Lee Gunn

    2017-06-01

    Full Text Available Since 2006, retired U.S. admirals and generals have been examining our changing physical world and assessing the impact of those changes on the security of the nation. A Military Advisory Board (MAB, convened by the CNA Corporation, a non-profit research and analysis institution that operates the Center for Naval Analyses and Institute for Public Research has issued two reports on the changing climate’s national security implications. The first report, published in 2007, stated that the changing climate would be destabilizing in many parts of the world. Climate change, in fact, would be a “threat multiplier”, the report claimed, and result in new and more urgent calls for the American military to provide humanitarian assistance and disaster relief (HADR as well as help sustain order and ensure conditions that would permit trade and prosperity worldwide. The MAB recommended urgent action by the Defense Department to prepare for new missions in new places; and that the Defense Department explicitly recognize missions stemming from the changing climate. CNA’s MAB then published three reports on energy, relating to climate change, one each on: the coming age of renewables, the nation’s energy dependence, and the future of energy in terms of America’s international competitiveness (CNA-MAB, 2009; CNA-MAB, 2010; CNA-MAB, 2011. In 2014, the Military Advisory Board noted that the climate was changing more quickly than had been forecast in 2007. Undertaking a new climate study, the board concluded that more needed to be done, and done quickly, to prepare for and confront the “catalyst for conflict” that the board now saw in climate change. Guest Editors’ Note: The following commentary derives from a presentation by Vice Admiral Lee Gunn, U.S. Navy (Ret., delivered by invitation at the American Association for the Advancement of Science Meeting, San Jose, California, February 13, 2015. Prior to his advisory role for the U.S. Military and

  7. Interest Rate Risk Management and the Use of Derivative Securities

    Directory of Open Access Journals (Sweden)

    Ioana-Diana PĂUN

    2013-12-01

    Full Text Available This study aims to demonstrate the utility of derivative financial instruments for the management of interest rate risk that is faced by banks and financial institutions, and to provide an efficient flow of monitoring and control thereof. Banking institutions can now use a combination of balance sheet and off balance sheet measures, i.e. gap method, of interest rate risk management, in order to control exposure of short-term rates and derivatives to control the residual interest rate exposures. The result of the study shows that banks can achieve better diversification and risk management using derivatives.

  8. Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts

    National Research Council Canada - National Science Library

    Decker, Raymond

    2001-01-01

    .... Mail and postal workers. As requested, my testimony will focus on the work we have done over the past five years on combating terrorism and our recommendations advocating a risk management approach for such programs...

  9. A Cyber Security Risk Assessment of Hospital Infrastructure including TLS/SSL and other Threats

    OpenAIRE

    Millar, Stuart

    2016-01-01

    Cyber threats traditionally target governments, financial institutions and businesses. However, of growing concern is the threat to healthcare organizations. This study conducts a cyber security risk assessment of a theoretical hospital environment, to include TLS/SSL, which is an encryption protocol for network communications, plus other physical, logical and human threats. Despite significant budgets in the UK for the NHS, the spend on cyber security appears worryingly low and many hospital...

  10. Integrating Security Risk Management into Business Process Management for the Cloud

    OpenAIRE

    Goettelmann , Elio; Mayer , Nicolas; Godart , Claude

    2014-01-01

    International audience; Security issues are still preventing wider adoption of cloud computing, especially for businesses which are handling sensitive information. Indeed, by outsourcing its information system (IS), a company can lose control over its infrastructure, its software or even its data. Therefore, new methods and tools need to be defined to respond to this challenge. In this paper we propose to integrate Security Risk Management approaches into Business Process Management to effect...

  11. A total risk assessment methodology for security assessment

    International Nuclear Information System (INIS)

    Auilar, Richard; Pless, Daniel J.; Kaplan, Paul Garry; Silva, Consuelo Juanita; Rhea, Ronald Edward; Wyss, Gregory Dane; Conrad, Stephen Hamilton

    2009-01-01

    Sandia National Laboratories performed a two-year Laboratory Directed Research and Development project to develop a new collaborative risk assessment method to enable decision makers to fully consider the interrelationships between threat, vulnerability, and consequence. A five-step Total Risk Assessment Methodology was developed to enable interdisciplinary collaborative risk assessment by experts from these disciplines. The objective of this process is promote effective risk management by enabling analysts to identify scenarios that are simultaneously achievable by an adversary, desirable to the adversary, and of concern to the system owner or to society. The basic steps are risk identification, collaborative scenario refinement and evaluation, scenario cohort identification and risk ranking, threat chain mitigation analysis, and residual risk assessment. The method is highly iterative, especially with regard to scenario refinement and evaluation. The Total Risk Assessment Methodology includes objective consideration of relative attack likelihood instead of subjective expert judgment. The 'probability of attack' is not computed, but the relative likelihood for each scenario is assessed through identifying and analyzing scenario cohort groups, which are groups of scenarios with comparable qualities to the scenario being analyzed at both this and other targets. Scenarios for the target under consideration and other targets are placed into cohort groups under an established ranking process that reflects the following three factors: known targeting, achievable consequences, and the resources required for an adversary to have a high likelihood of success. The development of these target cohort groups implements, mathematically, the idea that adversaries are actively choosing among possible attack scenarios and avoiding scenarios that would be significantly suboptimal to their objectives. An adversary who can choose among only a few comparable targets and scenarios (a

  12. Cyber security risk evaluation of a nuclear I and C using BN and ET

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Dept. of Nuclear Engineering, Kyung Hee University, Yongin (Korea, Republic of); Son, Han Seong [Computer and Game Science, Joongbu University, Geumsan (Korea, Republic of)

    2017-04-15

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  13. Cyber security risk evaluation of a nuclear I and C using BN and ET

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Son, Han Seong

    2017-01-01

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks

  14. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    Directory of Open Access Journals (Sweden)

    Jinsoo Shin

    2017-04-01

    Full Text Available Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

  15. Reduced cancer risk in vegetarians: an analysis of recent reports

    Directory of Open Access Journals (Sweden)

    Amy Joy Lanou

    2010-12-01

    Full Text Available Amy Joy Lanou1, Barbara Svenson21Department of Health and Wellness, 2Ramsey Library, University of North Carolina Asheville, Asheville, NC, USAAbstract: This report reviews current evidence regarding the relationship between vegetarian eating patterns and cancer risk. Although plant-based diets including vegetarian and vegan diets are generally considered to be cancer protective, very few studies have directly addressed this question. Most large prospective observational studies show that vegetarian diets are at least modestly cancer protective (10%–12% reduction in overall cancer risk although results for specific cancers are less clear. No long-term randomized clinical trials have been conducted to address this relationship. However, a broad body of evidence links specific plant foods such as fruits and vegetables, plant constituents such as fiber, antioxidants and other phytochemicals, and achieving and maintaining a healthy weight to reduced risk of cancer diagnosis and recurrence. Also, research links the consumption of meat, especially red and processed meats, to increased risk of several types of cancer. Vegetarian and vegan diets increase beneficial plant foods and plant constituents, eliminate the intake of red and processed meat, and aid in achieving and maintaining a healthy weight. The direct and indirect evidence taken together suggests that vegetarian diets are a useful strategy for reducing risk of cancer.Keywords: diet, vegan, prevention

  16. Reduced cancer risk in vegetarians: an analysis of recent reports.

    Science.gov (United States)

    Lanou, Amy Joy; Svenson, Barbara

    2010-12-20

    This report reviews current evidence regarding the relationship between vegetarian eating patterns and cancer risk. Although plant-based diets including vegetarian and vegan diets are generally considered to be cancer protective, very few studies have directly addressed this question. Most large prospective observational studies show that vegetarian diets are at least modestly cancer protective (10%-12% reduction in overall cancer risk) although results for specific cancers are less clear. No long-term randomized clinical trials have been conducted to address this relationship. However, a broad body of evidence links specific plant foods such as fruits and vegetables, plant constituents such as fiber, antioxidants and other phytochemicals, and achieving and maintaining a healthy weight to reduced risk of cancer diagnosis and recurrence. Also, research links the consumption of meat, especially red and processed meats, to increased risk of several types of cancer. Vegetarian and vegan diets increase beneficial plant foods and plant constituents, eliminate the intake of red and processed meat, and aid in achieving and maintaining a healthy weight. The direct and indirect evidence taken together suggests that vegetarian diets are a useful strategy for reducing risk of cancer.

  17. Cities at risk: status of Italian planning system in reducing seismic and hydrogeological risks

    Directory of Open Access Journals (Sweden)

    Grazia Di Giovanni

    2016-03-01

    Full Text Available Italy and its urban systems are under high seismic and hydrogeological risks. The awareness about the role of human activities in the genesis of disasters is achieved in the scientific debate, as well as the role of urban and regional planning in reducing risks. The paper reviews the state of Italian major cities referred to hydrogeological and seismic risk by: 1 extrapolating data and maps about seismic hazard and landslide risk concerning cities with more than 50.000 inhabitants and metropolitan contexts, and 2 outlining how risk reduction is framed in Italian planning system (at national and regional levels. The analyses of available data and the review of the normative framework highlight the existing gaps in addressing risk reduction: nevertheless a wide knowledge about natural risks afflicting Italian territory and an articulated regulatory framework, the available data about risks are not exhaustive, and risk reduction policies and multidisciplinary pro-active approaches are only partially fostered and applied.

  18. Work-related violence against security guards--who is most at risk?

    Science.gov (United States)

    Leino, Tuula; Selin, Risto; Summala, Heikki; Virtanen, Marianna

    2011-01-01

    Studies on violence in the work of security guards are largely lacking. This study is unique in that it focuses on security guards (n=1,010) in Finland, and assesses the different forms, prevalence, and risk factors of the work-related violence they often face. Information to a survey instrument was obtained by first interviewing 30 volunteers. Then we made a cross-sectional mailed survey that was sent to a randomized group of 2,000 security guards. The response rate was 52. We found the prevalence of verbal aggression, threats of assault, and physical acts against security guards at least once a month to be 39%, 19%, and 15% respectively. As regards risk factors and who is most at risk, our results show that male gender, young age, low work experience, late working hours, and time pressure were associated with all three forms of work-related violence. Unlike other forms of violence, verbal aggression was highly prevalent outside the metropolitan area and directed towards both more and less experienced security guards. In prevention policies for violence, it is important to identify high-risk groups such as those who have less work experience.

  19. Boulder Food Rescue: An Innovative Approach to Reducing Food Waste and Increasing Food Security.

    Science.gov (United States)

    Sewald, Craig A; Kuo, Elena S; Dansky, Hana

    2018-05-01

    Food waste and food insecurity are both significant issues in communities throughout the U.S., including Boulder, Colorado. As much as 40% of the food produced in the U.S. goes uneaten and ends up in landfills. Nearly 13% of people in the Boulder region experience some level of food insecurity. Founded in 2011, Boulder Food Rescue supports community members to create their own food security through a participatory approach to an emergency food system. The organization uses a web-application "robot" to manage a schedule of volunteers. They coordinate with individuals at low-income senior housing sites, individual housing sites, family housing sites, after-school programs, and pre-schools to set up no-cost grocery programs stocked with food from local markets and grocers that would otherwise go to waste. Each site coordinator makes decisions about how, when, and where food delivery and distribution will occur. The program also conducts robust, real-time data collection and analysis. Boulder Food Rescue is a member and manager of the Food Rescue Alliance, and its model has been replicated and adapted by other cities, including Denver, Colorado Springs, Seattle, Jackson Hole, Minneapolis, Binghamton, and in the Philippines. Information for this special article was collected through key informant interviews with current and former Boulder Food Rescue staff and document review of Boulder Food Rescue materials. Boulder Food Rescue's open source software is available to other communities; to date, 40 cities have used the tool to start their own food rescue organizations. Boulder Food Rescue hopes to continue spreading this model to other cities that are considering ways to reduce food waste and increase food security. This article is part of a supplement entitled Building Thriving Communities Through Comprehensive Community Health Initiatives, which is sponsored by Kaiser Permanente, Community Health. Copyright © 2018 American Journal of Preventive Medicine. Published by

  20. Risk and confidence: towards a new social contract for security

    International Nuclear Information System (INIS)

    Heriard-Dubreuil, G.

    2002-01-01

    The situation of radiation protection should be put in the more general perspective of risk governance where new patterns of risk governance necessitate periodic updating of social trust within open decision making processes. This trend also affects the traditional risk governance patterns in the sense that their legitimacy is grounded on social delegation and no more on authority or scientific evidence. Whatever is the dominant pattern of risk governance there is consequently a real challenge for radiation protection to explicit and share with society the rationales of its expertise. This is why the spreading of a radiation protection culture is a key challenge for a better integration of radiation protection in modern societies. Standards and norms should no more be prepared in the darkness of internalized decision making processes limited to Public Authorities, experts and operators. The use of standards should also be clearly linked with the acquisition and maintenance of a radiation protection culture. Radiation protection cannot remain in the hand of a few specialists. It should become a concern for all the exposed categories of actors in the relevant contexts. (author)

  1. 76 FR 41278 - Cargo Security Risk Reduction; Public Listening Sessions

    Science.gov (United States)

    2011-07-13

    ....mil/hq/cg5/cg544/cdc.asp or the Federal Docket Management System at http://www.Regulations.gov . For... important for the Coast Guard, in concert with stakeholders, to implement a holistic strategy to mitigate... risk management and shared responsibility between public and private sector stakeholders, across the...

  2. Optimisation of the securities portfolio as a part of the risk management process

    Directory of Open Access Journals (Sweden)

    Srečko Devjak

    2004-01-01

    Full Text Available Securities of Slovene companies are listed at the Ljubljana Stock Exchange. Market capitalisation at the Ljubljana Stock Exchange has been growing since 1996 due to new listings of equities. On the basis of financial data time series for listed equities, the financial investor can calculate a risk for each individual security with a selected risk measure and can determine an optimal portfolio, subject to selected constraints. In this paper, we shall consequently determine an optimal portfolio of equities for the financial investor, investing his assets only in selected equities listed at the Ljubljana Stock Exchange. Selecting an appropriate risk measure is especially important for a commercial bank in a risk management process. Commercial banks can use internal models in the risk management process and for the purpose of capital charges as well. An optimal portfolio will be calculated, using a non-linear mathematical model.

  3. Safety and security in transportation of radioactive material- the perception of risk

    Energy Technology Data Exchange (ETDEWEB)

    Ericsson, A.M.; Jaernry, C. [AMC Konsult AB, Bromma (Sweden)

    2004-07-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations.

  4. Safety and security in transportation of radioactive material- the perception of risk

    International Nuclear Information System (INIS)

    Ericsson, A.M.; Jaernry, C.

    2004-01-01

    Since the event of September 11, 2001, the way most people look at transportation risk has changed. There is now a lot more focusing on the security concerns related to the transportation of radioactive material. Most people are now more concerned about the risk of terrorist actions or sabotage than of accidents. This is probably due to the fact that the safety record for transportation of radioactive material has so far been very good and that most people experience terrorism and sabotage more scaring and less controllable than general accidents. This paper will compare the safety and the security regulations and discuss synergies and contradictions between the sets of regulations

  5. Design concept of CSRAS (Cyber Security Risk Analysis and Assessment System) for digital I and C systems

    International Nuclear Information System (INIS)

    Song, J. G.; Lee, J. W.; Lee, D. Y.; Lee, C. K.

    2012-01-01

    The instrumentation and control (I and C) systems in nuclear power plants (NPPs) have been digitalized recently. Hence, cyber security becomes an important feature to be incorporated into the I and C systems. The Regulatory Guide 5.71 published by U.C NRC in 2010 presents a comprehensive set of security controls for the cyber security of I and C systems in NPPs. However, the application of security controls specified in the RG 5.71 in a specific I and C system still requires many analysis efforts based on the understanding of the security controls, since the guideline does not provide the details to system designers or developers regarding what, where, and how to apply the security controls. To apply security controls to I and C systems, cyber security requirements should be identified based on the cyber security policy and program, then the design and implementation of security controls should be performed along with the I and C system development life cycle. It can be assumed that cyber security requirements are identified during the system design(SD) phase and the design and implementation of security controls is performed during the component design(CD) phase. When identifying security requirements and performing the design and implementation of security controls, cyber security risk assessments should be processed with the understanding of the characteristics of target systems. In this study, the Cyber Security Risk Analysis and Assessment System (CSRAS) has been developed as a tool for analyzing security requirements and technical security controls considering based on a general cyber security risk assessment procedure with the consideration of the characteristics of I and C systems and the development phases

  6. Design concept of CSRAS (Cyber Security Risk Analysis and Assessment System) for digital I and C systems

    Energy Technology Data Exchange (ETDEWEB)

    Song, J. G.; Lee, J. W.; Lee, D. Y.; Lee, C. K. [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    The instrumentation and control (I and C) systems in nuclear power plants (NPPs) have been digitalized recently. Hence, cyber security becomes an important feature to be incorporated into the I and C systems. The Regulatory Guide 5.71 published by U.C NRC in 2010 presents a comprehensive set of security controls for the cyber security of I and C systems in NPPs. However, the application of security controls specified in the RG 5.71 in a specific I and C system still requires many analysis efforts based on the understanding of the security controls, since the guideline does not provide the details to system designers or developers regarding what, where, and how to apply the security controls. To apply security controls to I and C systems, cyber security requirements should be identified based on the cyber security policy and program, then the design and implementation of security controls should be performed along with the I and C system development life cycle. It can be assumed that cyber security requirements are identified during the system design(SD) phase and the design and implementation of security controls is performed during the component design(CD) phase. When identifying security requirements and performing the design and implementation of security controls, cyber security risk assessments should be processed with the understanding of the characteristics of target systems. In this study, the Cyber Security Risk Analysis and Assessment System (CSRAS) has been developed as a tool for analyzing security requirements and technical security controls considering based on a general cyber security risk assessment procedure with the consideration of the characteristics of I and C systems and the development phases.

  7. Regional disaster risk management strategies for food security: Probing Southern African Development Community channels for influencing national policy

    Directory of Open Access Journals (Sweden)

    Happy M. Tirivangasi

    2018-05-01

    Full Text Available Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities. Consequently, this has an impact on market access, trade, food supply, reduced income, increased food prices, decreased farm income and employment. Natural disasters create poverty, which in turn increases the prevalence of food insecurity and malnutrition. It is clear that disasters put food security at risk. The poorest people in the community are affected by food insecurity and disasters; hence, there is a need to be prepared as well as be in a position to manage disasters. Without serious efforts to address them, the risks of disasters will become an increasingly serious obstacle to sustainable development and the achievement of sustainable development goals, particularly goal number 2 ‘end hunger, achieve food security and improved nutrition and promote sustainable agriculture’. In recent years, countries in southern Africa have experienced an increase in the frequency, magnitude and impact of climate change–related hazards such as droughts, veld fire, depleting water resources and flood events. This research aims to reveal Southern African Development Community disaster risk management strategies for food security to see how they an influence and shape policy at the national level in southern Africa. Sustainable Livelihood approach was adopted as the main theoretical framework for the study. The qualitative Analysis is based largely on data from databases such as national reports, regional reports and empirical findings on the disaster management–sustainable development nexus.

  8. Using detection and deterrence to reduce insider risk

    International Nuclear Information System (INIS)

    Eggers, R.F.; Carlson, R.L.; Udell, C.J.

    1988-01-01

    This paper addresses a new concept of interaction between adversary detection and deterrence. It provides an initial evaluation of the effects of these variables on the risk of theft of special nuclear material by an insider adversary and can be extended to the sabotage threat. A steady-state risk equation is used. Exercises with this equation show that deterrence, resulting from the prospect of detection, has a greater ability to reduce the risk than the detection exercise itself. This is true for all cases except those in which the probabilty of detection is 1. Cases were developed for three different types of adversaries that can be distinguished from one another by the level of detection they are willing to tolerate before they are deterred from attempting a theft. By considering the effects of detection, deterrence, and adversary type, the ground work is laid for designing cost-effective insider threat-protection systems

  9. Using detection and deterrence to reduce insider risk

    Energy Technology Data Exchange (ETDEWEB)

    Eggers, R F; Carlson, R L; Udell, C J

    1988-06-01

    This paper addresses a new concept of interaction between adversary detection and deterrence. It provides an initial evaluation of the effects of these variables on the risk of theft of special nuclear material by an insider adversary and can be extended to the sabotage threat. A steady-state risk equation is used. Exercises with this equation show that deterrence, resulting from the prospect of detection, has a greater ability to reduce the risk than the detection exercise itself. This is true for all cases except those in which the probability of detection is 1. Cases were developed for three different types of adversaries that can be distinguished from one another by the level of detection they are willing to tolerate before they are deterred from attempting a theft. By considering the effects of detection, deterrence, and adversary type, the ground work is laid for designing cost-effective insider threat-protection systems. 2 refs., 6 figs.

  10. Medical interventional procedures--reducing the radiation risks

    Energy Technology Data Exchange (ETDEWEB)

    Cousins, C. E-mail: claire.cousins@addenbrookes.nhs.uk; Sharp, C

    2004-06-01

    Over the last 40 years, the number of percutaneous interventional procedures using radiation has increased significantly, with many secondary care clinicians using fluoroscopically guided techniques. Many procedures can deliver high radiation doses to patients and staff, with the potential to cause immediate and delayed radiation effects. The challenge for interventionists is to maximize benefit, whilst minimizing radiation risk to patients and staff. Non-radiologist clinicians are often inadequately trained in radiation safety and radiobiology. However, clinical governance and legislation now requires a more rigorous approach to protecting patients and staff. Protection can be ensured, and risks can be controlled, by appropriate design, procurement and commissioning of equipment; quality assurance; and optimal operational technique, backed by audit. Interventionists need knowledge and skills to reduce the risks. Appropriate training should include awareness of the potential for radiation injury, equipment operational parameters, doses measurement and recording methods and dose reduction techniques. Clinical governance requires informed consent, appropriate patient counselling and follow-up.

  11. Medical interventional procedures--reducing the radiation risks

    International Nuclear Information System (INIS)

    Cousins, C.; Sharp, C.

    2004-01-01

    Over the last 40 years, the number of percutaneous interventional procedures using radiation has increased significantly, with many secondary care clinicians using fluoroscopically guided techniques. Many procedures can deliver high radiation doses to patients and staff, with the potential to cause immediate and delayed radiation effects. The challenge for interventionists is to maximize benefit, whilst minimizing radiation risk to patients and staff. Non-radiologist clinicians are often inadequately trained in radiation safety and radiobiology. However, clinical governance and legislation now requires a more rigorous approach to protecting patients and staff. Protection can be ensured, and risks can be controlled, by appropriate design, procurement and commissioning of equipment; quality assurance; and optimal operational technique, backed by audit. Interventionists need knowledge and skills to reduce the risks. Appropriate training should include awareness of the potential for radiation injury, equipment operational parameters, doses measurement and recording methods and dose reduction techniques. Clinical governance requires informed consent, appropriate patient counselling and follow-up

  12. Natural disturbance reduces disease risk in endangered rainforest frog populations.

    Science.gov (United States)

    Roznik, Elizabeth A; Sapsford, Sarah J; Pike, David A; Schwarzkopf, Lin; Alford, Ross A

    2015-08-21

    Natural disturbances can drive disease dynamics in animal populations by altering the microclimates experienced by hosts and their pathogens. Many pathogens are highly sensitive to temperature and moisture, and therefore small changes in habitat structure can alter the microclimate in ways that increase or decrease infection prevalence and intensity in host populations. Here we show that a reduction of rainforest canopy cover caused by a severe tropical cyclone decreased the risk of endangered rainforest frogs (Litoria rheocola) becoming infected by a fungal pathogen (Batrachochytrium dendrobatidis). Reductions in canopy cover increased the temperatures and rates of evaporative water loss in frog microhabitats, which reduced B. dendrobatidis infection risk in frogs by an average of 11-28% in cyclone-damaged areas, relative to unaffected areas. Natural disturbances to the rainforest canopy can therefore provide an immediate benefit to frogs by altering the microclimate in ways that reduce infection risk. This could increase host survival and reduce the probability of epidemic disease outbreaks. For amphibian populations under immediate threat from this pathogen, targeted manipulation of canopy cover could increase the availability of warmer, drier microclimates and therefore tip the balance from host extinction to coexistence.

  13. A 3S Risk ?3SR? Assessment Approach for Nuclear Power: Safety Security and Safeguards.

    Energy Technology Data Exchange (ETDEWEB)

    Forrest, Robert; Reinhardt, Jason Christian; Wheeler, Timothy A.; Williams, Adam David

    2017-11-01

    Safety-focused risk analysis and assessment approaches struggle to adequately include malicious, deliberate acts against the nuclear power industry's fissile and waste material, infrastructure, and facilities. Further, existing methods do not adequately address non- proliferation issues. Treating safety, security, and safeguards concerns independently is inefficient because, at best, it may not take explicit advantage of measures that provide benefits against multiple risk domains, and, at worst, it may lead to implementations that increase overall risk due to incompatibilities. What is needed is an integrated safety, security and safeguards risk (or "3SR") framework for describing and assessing nuclear power risks that can enable direct trade-offs and interactions in order to inform risk management processes -- a potential paradigm shift in risk analysis and management. These proceedings of the Sandia ePRA Workshop (held August 22-23, 2017) are an attempt to begin the discussions and deliberations to extend and augment safety focused risk assessment approaches to include security concerns and begin moving towards a 3S Risk approach. Safeguards concerns were not included in this initial workshop and are left to future efforts. This workshop focused on four themes in order to begin building out a the safety and security portions of the 3S Risk toolkit: 1. Historical Approaches and Tools 2. Current Challenges 3. Modern Approaches 4. Paths Forward and Next Steps This report is organized along the four areas described above, and concludes with a summary of key points. 2 Contact: rforres@sandia.gov; +1 (925) 294-2728

  14. Reducing the Risks for Contrast-Induced Nephropathy

    International Nuclear Information System (INIS)

    Stacul, Fulvio

    2005-01-01

    Contrast-induced nephropathy (CIN) is one of the most serious adverse events associated with the use of contrast media (CM). Patients who develop this complication can have increased morbidity, higher rates of mortality, lengthy hospital stays, and poor long-term outcomes. Although CIN cannot be eliminated, the chances of developing this condition can be reduced by using appropriate prevention strategies. An important first step to reduce the chance of CIN is to identify risk factors associated with this condition. Patients with a previously elevated serum creatinine level, especially when secondary to diabetic nephropathy, are at great risk for developing CIN. Other patient-related risk factors include concurrent use of nephrotoxic medications, dehydration, congestive heart failure, age greater than 70 years, and probably the presence of diabetes mellitus even if serum creatinine is normal. Adequate hydration is widely accepted as an important prophylactic measure for preventing CIN, but the optimal hydration regimen is still debatable. The risk of CIN increases with greater doses of CM, as well as with the type of CM used. A high-osmolar CM poses a greater risk of CIN than does a low-osmolar CM and, as recent but limited data suggest, the use of an iso-osmolar CM is less nephrotoxic than a low-osmolar CM in patients with renal impairment following intra-arterial procedures, although this finding needs to be verified in future clinical studies. Pharmacologic agents such as calcium channel blockers, dopamine, atrial natriuretic peptide, fenoldopam, prostaglandin E1, and endothelin receptor antagonist have not been proven effective against CIN development. Controversies still exist on the possible effectiveness of theophylline and N-acetylcysteine. Simple strategies for the prevention of CIN in at-risk patients are reviewed and unproven interventions are discussed

  15. Pharmacist intervention reduces gastropathy risk in patients using NSAIDs.

    Science.gov (United States)

    Ibañez-Cuevas, Victoria; Lopez-Briz, Eduardo; Guardiola-Chorro, M Teresa

    2008-12-01

    To establish a detection and intervention strategy in order to reduce the number of non-steroidal anti-inflammatory drug (NSAIDs) users at risk of gastropathy from receiving either inadequate or no gastroprotection. Community Pharmacies in Valencia, Spain. Prospective longitudinal intervention study without control group carried out by 79 Community Pharmacies. Patients over 18 who asked for any systemic NSAID were interviewed according to standard procedure. Pharmacist intervention was carried out when a patient at risk of serious NSAID-induced gastrointestinal complications due to inadequate or no gastric protection was identified. The doctor responsible was informed in order to then be able to assess the need to prescribe gastroprotection or change it if inadequate. In the case of over-the-counter (OTC) drugs, pharmacist intervention mainly involved replacing NSAIDs for safer medications. Firstly, the number of patients who had no prescribed gastroprotection or inadequate gastroprotection was determined. Pharmacist intervention then brought about changes in pharmacotherapy in this situation. Of the 6,965 patients who asked for NSAIDs during the study period, 3,054 (43.9%) presented NSAID gastropathy risk factors. 35.6% of the latter (1,089) were not prescribed gastroprotection or were prescribed inadequate gastroprotection. Pharmacist intervention was carried out in 1,075 of these cases. On 391 occasions such risk situations were reported to doctors, who accepted pharmacist intervention on 309 occasions (79.0%) and then either prescribed gastroprotection (77% of cases); changed it (13.9%); withdrew the NSAID (5.8%) or substituted it (3.2%). 235 Pharmacist interventions took place when dispensing OTC NSAIDs. Our strategy allowed us to identify a large number of patients who asked for NSAIDs in Community Pharmacies and who were at risk of NSAID gastropathy, as they received either inadequate gastroprotection or no gastroprotection whatsoever. Moreover, the

  16. The Shortage of Dentists: A Risk to National Security?

    Science.gov (United States)

    2008-03-19

    Shammari, et al., “Risk Indicators for Tooth Loss Due to Periodontal Disease ,” Journal of Periodontology (November 2005): 1910-1918. 62 Adapted from...the discussion on unmet treatment needs). Oral Disease : Impact on the Nation and Military Dental caries and periodontitis are chronic...destructive processes that generally become more severe over time. The single most common chronic childhood disease is dental caries.60 Periodontal disease

  17. An exploratory risk perception study of attitudes toward homeland security systems.

    Science.gov (United States)

    Sanquist, Thomas F; Mahy, Heidi; Morris, Frederic

    2008-08-01

    Understanding the issues surrounding public acceptance of homeland security systems is important for balancing security needs and potential civil liberties infringements. A psychometric survey was used in an exploratory study of attitudes regarding homeland security systems. Psychometric rating data were obtained from 182 respondents on psychological attributes associated with 12 distinct types of homeland security systems. An inverse relationship was observed for the overall rating attributes of acceptability and risk of civil liberties infringement. Principal components analysis (PCA) yielded a two-factor solution with the rating scale loading pattern suggesting factors of perceived effectiveness and perceived intrusiveness. These factors also showed an inverse relationship. The 12 different homeland security systems showed significantly different scores on the rating scales and PCA factors. Of the 12 systems studied, airport screening, canine detectors, and radiation monitoring at borders were found to be the most acceptable, while email monitoring, data mining, and global positioning satellite (GPS) tracking were found to be least acceptable. Students rated several systems as more effective than professionals, but the overall pattern of results for both types of subjects was similar. The data suggest that risk perception research and the psychometric paradigm are useful approaches for quantifying attitudes regarding homeland security systems and policies and can be used to anticipate potentially significant public acceptance issues.

  18. L-Band Digital Aeronautical Communications System Engineering - Initial Safety and Security Risk Assessment and Mitigation

    Science.gov (United States)

    Zelkin, Natalie; Henriksen, Stephen

    2011-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.

  19. Relationship Between Perceived Risk of Falling and Adoption of Precautions to Reduce Fall Risk.

    Science.gov (United States)

    Blalock, Susan J; Gildner, Paula L; Jones, Jennifer L; Bowling, James M; Casteel, Carri H

    2016-06-01

    To better understand the relationship between perceived risk of falling and awareness and adoption of four specific precautions that older adults have taken to reduce this risk. Cross-sectional. Data were collected in in-person interviews conducted in the homes of study participants. Interviews conducted between March 2011 and September 2013 and lasted an average of 60-90 minutes. A stratified sampling strategy designed to enroll an equal number of homebound and nonhomebound participants was used. All participants (N = 164) were recruited from central North Carolina. Participants were asked about 1-year fall history, perceived risk of falling, restriction of activities because of fear of falling, awareness of four recommended fall prevention behaviors (exercise, annual medication review, bathroom grab bars, safe footwear), and current practice of these behaviors. In bivariate analyses, individuals who were aware of two behaviors recommended to reduce the risk of falling (exercise, use of safe footwear) and had adopted these behaviors perceived their risk of falling as lower than individuals who were aware of the recommended behaviors but had not adopted them. Moreover, in multivariate analyses, individuals who did not know that exercise is recommended to reduce the risk of falling perceived their risk of falling as lower than those who were aware of this recommendation and had adopted it. Individuals were least likely to be aware that medication reviews and exercise are recommended to reduce fall risk. Awareness of behaviors recommended to reduce fall risk appears necessary for adoption of these behaviors to reduce perceived risk. Fall-prevention campaigns should emphasize behaviors where awareness is low. © 2016, Copyright the Authors Journal compilation © 2016, The American Geriatrics Society.

  20. Development of Risk Assessment Methodology for State's Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon; Seo, Hyung Min; Lee, Jung Ho; Kwak, Sung Woo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2011-05-15

    Threats of nuclear terrorism are increasing after 9/11 terrorist attack. Treats include nuclear explosive device (NED) made by terrorist groups, radiological damage caused by a sabotage aiming nuclear facilities, and radiological dispersion device (RDD), which is also called 'dirty bomb'. In 9/11, Al Qaeda planed to cause radiological consequences by the crash of a nuclear power plant and the captured airplane. The evidence of a dirty bomb experiment was found in Afganistan by the UK intelligence agency. Thus, the international communities including the IAEA work substantial efforts. The leaders of 47 nations attended the 2010 nuclear security summit hosted by President Obama, while the next global nuclear summit will be held in Seoul, 2012. Most states established and are maintaining state's nuclear security regime because of the increasing threat and the international obligations. However, each state's nuclear security regime is different and depends on the state's environment. The methodology for the assessment of state's nuclear security regime is necessary to design and implement an efficient nuclear security regime, and to figure out weak points. The IAEA's INPRO project suggests a checklist method for State's nuclear security regime. The IAEA is now researching more quantitative methods cooperatively with several countries including Korea. In this abstract, methodologies to evaluate state's nuclear security regime by risk assessment are addressed

  1. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  2. A Comparative Analysis of University Information Systems within the Scope of the Information Security Risks

    Directory of Open Access Journals (Sweden)

    Rustu Yilmaz

    2016-05-01

    Full Text Available Universities are the leading institutions that are the sources of educated human population who both produce information and ensure to develop new products and new services by using information effectively, and who are needed in every area. Therefore, universities are expected to be institutions where information and information management are used efficiently. In the present study, the topics such as infrastructure, operation, application, information, policy and human-based information security at universities were examined within the scope of the information security standards which are highly required and intended to be available at each university today, and then a comparative analysis was conducted specific to Turkey. Within the present study, the Microsoft Security Assessment Tool developed by Microsoft was used as the risk analysis tool. The analyses aim to enable the universities to compare their information systems with the information systems of other universities within the scope of the information security awareness, and to make suggestions in this regard.

  3. For telehealth to succeed, privacy and security risks must be identified and addressed.

    Science.gov (United States)

    Hall, Joseph L; McGraw, Deven

    2014-02-01

    The success of telehealth could be undermined if serious privacy and security risks are not addressed. For example, sensors that are located in a patient's home or that interface with the patient's body to detect safety issues or medical emergencies may inadvertently transmit sensitive information about household activities. Similarly, routine data transmissions from an app or medical device, such as an insulin pump, may be shared with third-party advertisers. Without adequate security and privacy protections for underlying telehealth data and systems, providers and patients will lack trust in the use of telehealth solutions. Although some federal and state guidelines for telehealth security and privacy have been established, many gaps remain. No federal agency currently has authority to enact privacy and security requirements to cover the telehealth ecosystem. This article examines privacy risks and security threats to telehealth applications and summarizes the extent to which technical controls and federal law adequately address these risks. We argue for a comprehensive federal regulatory framework for telehealth, developed and enforced by a single federal entity, the Federal Trade Commission, to bolster trust and fully realize the benefits of telehealth.

  4. Extreme Geohazards: Reducing the Disaster Risk and Increasing Resilience

    Science.gov (United States)

    Plag, Hans-Peter; Stein, Seth; Brocklebank, Sean; Jules-Plag, Shelley; Marsh, Stuart; Campus, Paola

    2013-04-01

    Extreme geohazards have the potential to escalate the global sustainability crisis and put us close to the boundaries of the safe operating space for humanity. Exposure of human assets to geohazards has increased dramatically in recent decades, and the sensitivity of the built environment and the embedded socio-economic fabric have changed. We are putting the urban environment, including megacities, in harm's way. Paradoxically, innovation during recent decades, in particular, urban innovation, has increased the disaster risk and coupled this risk to the sustainability crisis. Only more innovation can reduce disaster risk and lead us out of the sustainability crisis. Extreme geohazards (volcanic eruptions, earthquakes, tsunamis) that occurred regularly throughout the last few millennia mostly did not cause major disasters because population density was low and the built environment was not sprawling into hazardous areas to the same extent as today. Similar extreme events today would cause unparalleled damage on a global scale and could worsen the sustainability crisis. Simulation of these extreme hazards under present conditions can help to assess the disaster risk. The Geohazards Community of Practice of the Group on Earth Observations (GEO) with support from the European Science Foundation is preparing a white paper assessing the contemporary disaster risks associated with extreme geohazards and developing a vision for science and society to engage in deliberations addressing this risk (see http://www.geohazcop.org/projects/extgeowp). Risk awareness and monitoring is highly uneven across the world, and this creates two kinds of problems. Firstly, potential hazards are much more closely monitored in wealthy countries than in the developing world. But the largest hazards are global in nature, and it is critical to get as much forewarning as possible to develop an effective response. The disasters and near-misses of the past show that adherence to scientific

  5. Business risks, functions, methods of assessment and ways to reduce risk

    Directory of Open Access Journals (Sweden)

    A.V. Mihalchuk

    2015-06-01

    Full Text Available For successful existence in a market economy entrepreneur have to take bold actions, and this increases the risk. The article describes the concept of entrepreneurship and business risk, positive and negative aspects of functions of risk in business. Therefore, it is necessary to assess the risk properly and be able to manage it to achieve the most effective results in the market. In market conditions the problem of assessing and accounting market becomes independent theoretical and practical significance as an important component of the theory and practice of management. Risk - a key element of business activities. Development of risk situations can lead to both the occurrence of adverse effects (losses, lost profits, and positive results for a company in the form of increased profit. This article describes: the concept of entrepreneurship, risk and business risks, characteristic of positive and negative aspects of risk functions in business, methods of assessment and risk reduction, shows formulae and examples you can use to assess risk in an enterprise. Analyzing already established methods of risk assessment a number of rules were proposed in order to reduce business risk.

  6. Breastfeeding reduces the risk of obesity in childhood and adolescence

    Directory of Open Access Journals (Sweden)

    Eleni-Maria Papatesta

    2013-06-01

    Full Text Available Childhood obesity has increased dramatically over the last decades, representing one of the most serious public health hazards of the 21st century. Efforts must be made by healthcare professionals to prevent it, as it is associated with short- and long-term risks for physical and mental health and because of the increased possibility to persist during adulthood. From antiquity human breast milk was considered the ideal nourishment for the newborn. Breastfeeding is beneficial for the mother-child dyad. Among others, existing data suggest that it reduces the risk for childhood and adolescence obesity. The mechanisms for this are numerous and include the feeding behavior breastfeeding infants acquire, their growth rate, the ‘early protein hypothesis’, the role of leptin that is found in increased levels in human milk, the dietary choices the breastfed infants make during childhood and adolescence and finally the differences in their bowel flora. Meta-analyses provide sufficient evidence for this protective effect, with a dose-response effect as to the duration of breastfeeding. Healthcare professionals involved in the care of the mother-infant dyad must encourage and support mothers to breastfeed their infants for a long period of time, if obesity were to be prevented. Aim of this review is to provide an account of existing data on the association of breastfeeding and the reduced risk of obesity in childhood and adulthood.

  7. Reduced risk of UC in families affected by appendicitis

    DEFF Research Database (Denmark)

    Nyboe Andersen, Nynne; Gørtz, Sanne; Frisch, Morten

    2017-01-01

    OBJECTIVE: The possible aetiological link between appendicitis and UC remains unclear. In order to investigate the hereditary component of the association, we studied the risk of UC in family members of individuals with appendicitis. DESIGN: A cohort of 7.1 million individuals was established...... million person-years of follow-up between 1977 and 2011, a total of 190 004 cohort members developed appendicitis and 45 202 developed UC. Individuals having a first-degree relative with appendicitis before age 20 years had significantly reduced risk of UC (RR 0.90; 95% CI 0.86 to 0.95); this association...... was stronger in individuals with a family predisposition to UC (RR 0.66; 95% CI 0.51 to 0.83). CONCLUSIONS: Individuals with a first-degree relative diagnosed with appendicitis before age 20 years are at reduced risk of UC, particularly when there is a family predisposition to UC. Our findings question...

  8. A Risk-Sensitive Portfolio Optimization Problem with Fixed Incomes Securities

    OpenAIRE

    Goel, Mayank; Kumar, K. Suresh

    2007-01-01

    We discuss a class of risk-sensitive portfolio optimization problems. We consider the portfolio optimization model investigated by Nagai in 2003. The model by its nature can include fixed income securities as well in the portfolio. Under fairly general conditions, we prove the existence of optimal portfolio in both finite and infinite horizon problems.

  9. A threat-vulnerability based risk analysis model for cyber physical system security

    CSIR Research Space (South Africa)

    Ledwaba, Lehlogonolo

    2017-01-01

    Full Text Available model. An analysis of the Natanz system shows that, with an actual case security-risk score at Mitigation level 5, the infested facilities barely avoided a situation worse than the one which occurred. The paper concludes with a discussion on the need...

  10. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    -, 9/2008 (2008), s. 1-34 R&D Projects: GA ČR GA402/05/0711 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics http://ies.fsv.cuni.cz/default/file/download/id/8361

  11. A Model for an Information Security Risk Management (ISRM) Framework for Saudi Arabian Organisations

    Science.gov (United States)

    Alshareef, Naser

    2016-01-01

    Countries in the Gulf represent thriving, globally important commercial centres. They have embraced technology and modern management methods, often originating in the western countries. In adapting to quite different cultures these do not always operate as successfully. The adoption and practices of the Information Security Risk Management (ISRM)…

  12. Carboy Security Risk Analysis Model of I and C System Using Bayesian Network

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of); Park, Jaekwan [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-05-15

    The Korea Institute of Nuclear Safety (KINS) as a regulatory agency declares the R. G 8.22 for applying cyber security in Korea in 2011. In nuclear power industrial, ShinUljin 1, 2 unit and Shingori 3, 4 unit are demonstrating the cyber security for the first time. And in terms of research, the National Security Research Institute and the Korea Atomic Energy Research Institute are developing the nuclear power plant cyber security system in Korean. Currently, these cyber securities like regulation, demonstration and research are focused on nuclear power plant. However, cyber security is also important for the nuclear research reactor like a HANARO which is in Daejeon, primarily due to its characteristic as research reactor since since people access more than power plant. Analysis of the key elements of cyber security is possible to study through the activity-quality and architecture analysis model of cyber security. It is possible to analyze the extent reflected final risk by evaluating input score for each checklist. In this way, you can see an important checklist. Further, if the cyber-attack occurs, it is possible to provide an evidentiary material that is able to determine the key check element corresponding to each situation via a reverse calculation of BN. Finally, Utilization is possible to create a simulated penetratio test scenario according to each situation. Analysis of the key elements of cyber security is possible to study through the activity-quality and architecture analysis model of cyber security. It is possible to analyze the extent reflected in the final risk by evaluating input score for each checklist, in this way, you can see an important checklist. Furthermore, if the cyber-attack occurs, it is possible to provide an evidentiary material that enables to determine the key check element corresponding to each situation via a reverse calculation of BN. Finally, Utilization is possible to create a simulated penetration test scenario according to

  13. Carboy Security Risk Analysis Model of I and C System Using Bayesian Network

    International Nuclear Information System (INIS)

    Shin, Jinsoo; Heo, Gyunyoung; Son, Hanseong; Park, Jaekwan

    2013-01-01

    The Korea Institute of Nuclear Safety (KINS) as a regulatory agency declares the R. G 8.22 for applying cyber security in Korea in 2011. In nuclear power industrial, ShinUljin 1, 2 unit and Shingori 3, 4 unit are demonstrating the cyber security for the first time. And in terms of research, the National Security Research Institute and the Korea Atomic Energy Research Institute are developing the nuclear power plant cyber security system in Korean. Currently, these cyber securities like regulation, demonstration and research are focused on nuclear power plant. However, cyber security is also important for the nuclear research reactor like a HANARO which is in Daejeon, primarily due to its characteristic as research reactor since since people access more than power plant. Analysis of the key elements of cyber security is possible to study through the activity-quality and architecture analysis model of cyber security. It is possible to analyze the extent reflected final risk by evaluating input score for each checklist. In this way, you can see an important checklist. Further, if the cyber-attack occurs, it is possible to provide an evidentiary material that is able to determine the key check element corresponding to each situation via a reverse calculation of BN. Finally, Utilization is possible to create a simulated penetratio test scenario according to each situation. Analysis of the key elements of cyber security is possible to study through the activity-quality and architecture analysis model of cyber security. It is possible to analyze the extent reflected in the final risk by evaluating input score for each checklist, in this way, you can see an important checklist. Furthermore, if the cyber-attack occurs, it is possible to provide an evidentiary material that enables to determine the key check element corresponding to each situation via a reverse calculation of BN. Finally, Utilization is possible to create a simulated penetration test scenario according to

  14. Active fans and grizzly bears: Reducing risks for wilderness campers

    Science.gov (United States)

    Sakals, M. E.; Wilford, D. J.; Wellwood, D. W.; MacDougall, S. A.

    2010-03-01

    Active geomorphic fans experience debris flows, debris floods and/or floods (hydrogeomorphic processes) that can be hazards to humans. Grizzly bears ( Ursus arctos) can also be a hazard to humans. This paper presents the results of a cross-disciplinary study that analyzed both hydrogeomorphic and grizzly bear hazards to wilderness campers on geomorphic fans along a popular hiking trail in Kluane National Park and Reserve in southwestern Yukon Territory, Canada. Based on the results, a method is proposed to reduce the risks to campers associated with camping on fans. The method includes both landscape and site scales and is based on easily understood and readily available information regarding weather, vegetation, stream bank conditions, and bear ecology and behaviour. Educating wilderness campers and providing a method of decision-making to reduce risk supports Parks Canada's public safety program; a program based on the principle of user self-sufficiency. Reducing grizzly bear-human conflicts complements the efforts of Parks Canada to ensure a healthy grizzly bear population.

  15. Preliminary analysis of the inclusion of security passive systems to reduce the impact of accidents in nuclear power plants

    International Nuclear Information System (INIS)

    Sanchez J, J.; Morales S, J. B.; Espinosa P, G.

    2011-11-01

    In this work is presented a conceptual analysis of possible benefits and limitations that potentially represents the introduction of security passive systems to reduce the events impact of very low probability and high risk to the systems of radioactive material confinement of a light water reactor. These events are related with the possibility that a hydrogen explosion is presented as consequence of the accumulation of the same hydrogen in the contention of the reactor, in a scenario of severe accident. This accumulated hydrogen can be liberated in the reactor building or primary contention, where the conditions of their atmosphere make but prone the combustion. The catalytic recombination represents a viable option for the hydrogen concentrations decrease and because this recombination is highly exothermic, is important to analyze and to know if the recombined vapor to high temperature can be used in combination with vapor injectors that in turn, they are passive systems. In the following sections an explanation is presented about the use of the mentioned systems, as well as some results on the behavior of the vapor injectors. (Author)

  16. Reduced risk HTGR concept for industrial heat application

    International Nuclear Information System (INIS)

    Boardman, C.E.; Lipps, A.J.

    1982-01-01

    The industrial process heat market has been identified as major market for the High Temperature Gas-Cooled Reactor (HTGR), however, this market introduces stringent availability requirements on the reactor system relative to electric plants which feed a large existing grid. The characteristics and requirements of the industrial heat markets are summarized; the risks associated with serving this market with a single large HTGR will be discussed; and the modular concept, which has the potential to reduce both safety and investment risks, will be described. The reference modular concept described consists of several small, relatively benign nuclear heat sources linked together to supply heat energy to a balance-of-plant incorporating a process gas train/thermochemical pipe line system and a normal steam-electric plant

  17. Workplace Interventions to Reduce Obesity and Cardiometabolic Risk.

    Science.gov (United States)

    Thorndike, Anne N

    2011-02-01

    The worksite is ideal for implementing interventions to reduce obesity and cardiometabolic risk factors. Although worksite health promotion is not new, employer-sponsored wellness programs have become more widespread due to the rising prevalence and high cost of obesity. Over the past two decades, employers and researchers focused efforts on individual-based programs to change employees' nutrition and exercise behaviors, but more recently, the worksite environment has been targeted. Overall, there is good evidence that individual-based worksite programs can produce modest weight loss, but the evidence for effects on other risk factors and on long-term health outcomes and costs is inconsistent. There is less evidence for the benefit of environmental-based interventions, and more data will be needed to establish conclusions about the benefits of these types of interventions. A major challenge for employers and researchers in the future will be to find the balance between effectiveness and economic viability of worksite wellness programs.

  18. Breast-feeding reduces the risk for childhood eczema.

    Science.gov (United States)

    Kull, Inger; Böhme, Maria; Wahlgren, Carl-Fredrik; Nordvall, Lennart; Pershagen, Göran; Wickman, Magnus

    2005-09-01

    The evidence for a preventive effect of breast-feeding on the development of eczema in childhood remains controversial. To investigate the effect of breast-feeding in various phenotypes of eczema to 4 years. A birth cohort of 4089 children made up the study base. Data on breast-feeding, allergic symptoms, and potential confounders were obtained from questionnaires when the children were 2 months and 1, 2, and 4 years old. At 4 years, blood specific IgE was analyzed. Children with symptoms of eczema and asthma during the period of breast-feeding were excluded in most analyses on risk assessment of eczema and asthma, respectively, to avoid disease-related modification of exposure. Exclusive breast-feeding for >or=4 months reduced the risk for eczema at the age of 4 years (odds ratio [OR], 0.78; 95% CI, 0.63--0.96) irrespective of combination with asthma, sensitization to common allergens, or parental allergic disease. This decreased risk was most evident for children with onset of eczema during the first 2 years persisting to 4 years (OR, 0.59; 95% CI, 0.45--0.77). Among children with early-onset eczema, irrespective of persistency, followed by late onset of asthma or early-onset asthma irrespective of persistency, followed by late-onset eczema to 4 years, a protective effect of breast-feeding was also seen (OR, 0.48; 95% CI, 0.30--0.76). Breast-feeding 4 months or more reduces the risk for eczema and onset of the allergy march to age 4.

  19. Reducing the extinction risk of stochastic populations via nondemographic noise

    Science.gov (United States)

    Be'er, Shay; Assaf, Michael

    2018-02-01

    We consider nondemographic noise in the form of uncertainty in the reaction step size and reveal a dramatic effect this noise may have on the stability of self-regulating populations. Employing the reaction scheme m A →k A but allowing, e.g., the product number k to be a priori unknown and sampled from a given distribution, we show that such nondemographic noise can greatly reduce the population's extinction risk compared to the fixed k case. Our analysis is tested against numerical simulations, and by using empirical data of different species, we argue that certain distributions may be more evolutionary beneficial than others.

  20. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II.

    Science.gov (United States)

    Watzlaf, Valerie J M; Moeini, Sohrab; Matusow, Laura; Firouzan, Patti

    2011-01-01

    In a previous publication the authors developed a privacy and security checklist to evaluate Voice over Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this paper, the privacy and security checklist that was previously developed is used to perform a risk analysis of the top ten VoIP videoconferencing software to determine if their policies provide answers to the privacy and security checklist. Sixty percent of the companies claimed they do not listen into video-therapy calls unless maintenance is needed. Only 50% of the companies assessed use some form of encryption, and some did not specify what type of encryption was used. Seventy percent of the companies assessed did not specify any form of auditing on their servers. Statistically significant differences across company websites were found for sharing information outside of the country (p=0.010), encryption (p=0.006), and security evaluation (p=0.005). Healthcare providers considering use of VoIP software for TR services may consider using this privacy and security checklist before deciding to incorporate a VoIP software system for TR. Other videoconferencing software that is specific for TR with strong encryption, good access controls, and hardware that meets privacy and security standards should be considered for use with TR.

  1. Reducing The Risk Of Fires In Conveyor Transport

    Science.gov (United States)

    Cheremushkina, M. S.; Poddubniy, D. A.

    2017-01-01

    The paper deals with the actual problem of increasing the safety of operation of belt conveyors in mines. Was developed the control algorithm that meets the technical requirements of the mine belt conveyors, reduces the risk of fires of conveyors belt, and enables energy and resource savings taking into account random sort of traffic. The most effective method of decision such tasks is the construction of control systems with the use of variable speed drives for asynchronous motors. Was designed the mathematical model of the system "variable speed multiengine drive - conveyor - control system of conveyors", that takes into account the dynamic processes occurring in the elements of the transport system, provides an assessment of the energy efficiency of application the developed algorithms, which allows to reduce the dynamic overload in the belt to (15-20)%.

  2. Distance factor on reducing scattered radiation risk during interventional fluoroscopy

    International Nuclear Information System (INIS)

    Husaini Salleh; Mohd Khalid Matori; Muhammad Jamal Mat Isa; Zainal Jamaluddin; Mohd Firdaus Abdul Rahman; Mohd Khairusalih Mohd Zin

    2012-01-01

    Interventional Radiology (IR) is subspecialty of diagnostic radiology where minimally invasive procedures are performed using an x-ray as a guidance. This procedure can deliver high radiation doses to patient and medical staff compared with other radiological method due to long screening time. The use of proper shielding, shorten the exposure time and keep the distance are the practices to reduce scattered radiation risks to staff involve in this procedure. This project is to study the distance factor on reducing the scattered radiation effect to the medical staff. It also may provide the useful information which can be use to establish the scattered radiation profile during the IR for the sake of radiation protection and safety to the medical staff involved. (author)

  3. Community Savings Groups, Financial Security, and HIV Risk Among Female Sex Workers in Iringa, Tanzania.

    Science.gov (United States)

    Mantsios, Andrea; Galai, Noya; Mbwambo, Jessie; Likindikoki, Samuel; Shembilu, Catherine; Mwampashi, Ard; Beckham, S W; Leddy, Anna; Davis, Wendy; Sherman, Susan; Kennedy, Caitlin; Kerrigan, Deanna

    2018-02-24

    This study assessed the association between community savings group participation and consistent condom use (CCU) among female sex workers (FSW) in Iringa, Tanzania. Using cross-sectional data from a survey of venue-based FSW (n = 496), logistic regression was used to examine the associations between financial indicators including community savings group participation and CCU. Over one-third (35%) of the women participated in a savings group. Multivariable regression results indicated that participating in a savings group was significantly associated with nearly two times greater odds of CCU with new clients in the last 30 days (aOR = 1.77, 95% CI 1.10-2.86). Exploratory mediation analysis indicated that the relationship between savings group participation and CCU was partially mediated by financial security, as measured by monthly income. Findings indicate that community savings groups may play an important role in reducing sexual risk behaviors of FSW and hold promise as part of comprehensive, community-led HIV prevention strategies among FSW.

  4. Digital Health Data: A Comprehensive Review of Privacy and Security Risks and Some Recommendations

    Directory of Open Access Journals (Sweden)

    Shahidul Islam Khan

    2016-08-01

    Full Text Available In today’s world, health data are being produced in ever\\-increasing amounts due to extensive use of medical devices generating data in digital form. These data are stored in diverse formats at different health information systems. Medical practitioners and researchers can be benefited significantly if these massive heterogeneous data could be integrated and made accessible through a common platform. On the other hand, digital health data containing protected health information (PHI are the main target of the cybercriminals. In this paper, we have provided a state of the art review of the security threats in the integrated healthcare information systems. According to our analysis, healthcare data servers are leading target of the hackers because of monetary value. At present, attacks on healthcare organizations' data are 1.25 times higher compared to five years ago. We have provided some important recommendations to minimize the risk of attacks and to reduce the chance of compromising patients' privacy after any successful attack.

  5. The Effect of Knowledge of Online Security Risks on Consumer Decision Making in B2C e-Commerce

    Science.gov (United States)

    Wang, Ping An

    2010-01-01

    This dissertation research studied how different degrees of knowledge of online security risks affect B2C (business-to-consumer) e-commerce consumer decision making. Online information security risks, such as identity theft, have increasingly become a major factor inhibiting the potential growth of e-commerce. On the other hand, e-commerce…

  6. Uranium and thorium mining and milling: material security and risk assessment

    International Nuclear Information System (INIS)

    Steinhaeusler, F.; Zaitseva, L.

    2005-01-01

    several of the following pre-requisites in order to breach the current level of security at mining and milling facilities: covert political support; covert support by members of the security forces and/or intelligence community; adequate transport capability for bulk shipments or material by rail, road, ship, or air; corruption at the level of government officials, such as export control agencies, customs officers, and border guards. The number of illicit trafficking cases involving uranium and thorium that are known to have occurred shows that the current system of physical protection and accounting is in need of improvement. In order to reduce this risk in the future a series of practically applicable actions are recommended. (author)

  7. Financial Risk Ratios and Earnings Management: Reducing Uncertainties in Shariah-compliant Companies

    Directory of Open Access Journals (Sweden)

    Soheil Kazemian

    2018-01-01

    Full Text Available This study examines whether Shariah-compliant companies practice earnings management by investigating the relationship among the risk of financial distress, leverage, and free cash flow in discretionary accruals, which function as a substitute for earnings management. This empirical research is conducted on a sample of Malaysian Shariah-compliant companies from all industries in Bursa Malaysia from 2012 to 2014. Results show that Shariah-compliant companies are highly influenced by the risk of financial distress, leverage, and free cash flow. This study argues that working as either Shariah-compliant or non-Shariah-compliant does not affect the level of earnings management through financial distress, high leverage, and free cash flow by managers. Results should be of interest to stakeholders, shareholders, and regulatory bodies (i.e., the Shariah Advisory Council and the Securities Commission that oversee the accountability of corporate financial reporting to prevent earnings management in Shariah-compliant companies. Findings can also aid relevant authorities (i.e., the Shariah Advisory Council and the Security Commission in Malaysia in overcoming or reducing problems related to earnings management. This study is one of the most significant works in Malaysia in terms of sample size and methodology. It argues that the three elements of earnings management (i.e., financial distress, high leverage, and free cash flow influence better disclosure of reported earnings.

  8. Managing the risks of legacy radioactive sources from a security perspective

    International Nuclear Information System (INIS)

    Alexander, Mark; Murray, Allan

    2008-01-01

    The safety and security risk posed by highly radioactive, long-lived sources at the end of their normal use has not been consistently well-managed in previous decades. The Brazilian Cs-137 accident in 1986 and the Thailand Co-60 accident in 2000 are prime examples of the consequences that ensue from the loss of control of highly dangerous sources after their normal use. With the new international emphasis on security of radioactive sources throughout their life cycle, there is now further incentive to address the management of risks posed by legacy, highly dangerous radioactive sources. The ANSTO South-East Asia Regional Security of Radioactive Sources (RSRS) Project has identified, and is addressing, a number of legacy situations that have arisen as a result of inadequate management practices in the past. Specific examples are provided of these legacy situations and the lessons learned for managing the consequent safety and security risk, and for future complete life-cycle management of highly radioactive sources. (author)

  9. Truck shipment risks for assessing hazardous materials - a new paradigm incorporating safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, A.; McSweeney, T.; Allen, J.; Lepofsky, M. [Battelle Memorial Inst., Columbus, OH (United States); Abkowitz, M. [Dept. of Civil Engineering, Vanderbilt Univ., Nashville, TN (United States)

    2004-07-01

    Recent terrorist events, most notably September 11, 2001, have taught us that transportation risk management must be performed with a different lens to accommodate terrorism scenarios that would have previously been considered unlikely to warrant serious attention. Given these circumstances, a new paradigm is needed for managing the risks associated with highway transport of hazardous materials. In particular, this paradigm must: 1) more explicitly consider security threat and vulnerability, and 2) integrate security considerations into an overall framework for addressing natural and man-made disasters, be they accidental or planned. This paper summarizes the results of a study sponsored by the U.S. Department of Transportation, Federal Motor Carrier Safety Administration for the purpose of exploring how a paradigm might evolve in which both safety and security risks can be evaluated as a systematic, integrated process. The work was directed at developing a methodology for assessing the impacts of hazardous materials safety and security incident consequences when transported by highway. This included consideration of the manner in which these materials could be involved in initiating events as well as potential outcomes under a variety of release conditions. The methodology is subsequently applied to various classes of hazardous materials to establish an economic profile of the impacts that might be expected if a major release were to occur. The paper concludes with a discussion of the findings and implications associated with this effort.

  10. Spatio-temporal dynamics of security investments in an interdependent risk environment

    Science.gov (United States)

    Shafi, Kamran; Bender, Axel; Zhong, Weicai; Abbass, Hussein A.

    2012-10-01

    In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.

  11. Truck shipment risks for assessing hazardous materials - a new paradigm incorporating safety and security

    International Nuclear Information System (INIS)

    Greenberg, A.; McSweeney, T.; Allen, J.; Lepofsky, M.; Abkowitz, M.

    2004-01-01

    Recent terrorist events, most notably September 11, 2001, have taught us that transportation risk management must be performed with a different lens to accommodate terrorism scenarios that would have previously been considered unlikely to warrant serious attention. Given these circumstances, a new paradigm is needed for managing the risks associated with highway transport of hazardous materials. In particular, this paradigm must: 1) more explicitly consider security threat and vulnerability, and 2) integrate security considerations into an overall framework for addressing natural and man-made disasters, be they accidental or planned. This paper summarizes the results of a study sponsored by the U.S. Department of Transportation, Federal Motor Carrier Safety Administration for the purpose of exploring how a paradigm might evolve in which both safety and security risks can be evaluated as a systematic, integrated process. The work was directed at developing a methodology for assessing the impacts of hazardous materials safety and security incident consequences when transported by highway. This included consideration of the manner in which these materials could be involved in initiating events as well as potential outcomes under a variety of release conditions. The methodology is subsequently applied to various classes of hazardous materials to establish an economic profile of the impacts that might be expected if a major release were to occur. The paper concludes with a discussion of the findings and implications associated with this effort

  12. Reducing an Insurgency's Foothold: Using Army Sustainability Concepts as a Tool of Security Cooperation for AFRICOM

    National Research Council Canada - National Science Library

    Hill, Timothy E

    2008-01-01

    .... civilian and military efforts. It is designed to provide an integrated approach to new security challenges such as insurgency, the most likely form of warfare in which the United States will be engaged in the next several decades...

  13. An analysis of security price risk and return among publicly traded pharmacy corporations.

    Science.gov (United States)

    Gilligan, Adrienne M; Skrepnek, Grant H

    2013-01-01

    Community pharmacies have been subject to intense and increasing competition in the past several decades. To determine the security price risk and rate of return of publicly traded pharmacy corporations present on the major U.S. stock exchanges from 1930 to 2009. The Center of Research in Security Prices (CRSP) database was used to examine monthly security-level stock market prices in this observational retrospective study. The primary outcome of interest was the equity risk premium, with analyses focusing upon financial metrics associated with risk and return based upon modern portfolio theory (MPT) including: abnormal returns (i.e., alpha), volatility (i.e., beta), and percentage of returns explained (i.e., adjusted R(2)). Three equilibrium models were estimated using random-effects generalized least squares (GLS): 1) the Capital Asset Pricing Model (CAPM); 2) Fama-French Three-Factor Model; and 3) Carhart Four-Factor Model. Seventy-five companies were examined from 1930 to 2009, with overall adjusted R(2) values ranging from 0.13 with the CAPM to 0.16 with the Four-Factor model. Alpha was not significant within any of the equilibrium models across the entire 80-year time period, though was found from 1999 to 2009 in the Three- and Four-Factor models to be associated with a large, significant, and negative risk-adjusted abnormal returns of -33.84%. Volatility varied across specific time periods based upon the financial model employed. This investigation of risk and return within publicly listed pharmacy corporations from 1930 to 2009 found that substantial losses were incurred particularly from 1999 to 2009, with risk-adjusted security valuations decreasing by one-third. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. IRSN 2007 barometer: perception of risks and security by French people. Global results

    International Nuclear Information System (INIS)

    2007-07-01

    This report presents under the form of graphs and comments the results of the annual IRSN opinion poll on matters of risk and security. The IRSN is the French Institute of Radioprotection and Nuclear Safety. Different themes are analysed: the present concerns for French people (in the present society, for the environment, about industrial risks and the image of science), the perception of expertise (who should control an installation, the role and the image of scientific experts, access to expertise documents), the public interest in risk issues (topic of interest, participation to information sessions), the attitude in front of 30 risk situations (presently perceived risks, confidence in public authorities to ensure their protection, truth about information on hazards, hierarchy of 30 situations). The last part is dedicated to the nuclear domain (nuclear risk, skill and credibility of interveners)

  15. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Science.gov (United States)

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR. PMID:25945172

  16. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Directory of Open Access Journals (Sweden)

    Valerie J.M. Watzlaf

    2010-10-01

    Full Text Available Voice over the Internet Protocol (VoIP systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR therapy that can provide voice and video teleconferencing between patients and therapists.  Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care, and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.   

  17. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.

    Science.gov (United States)

    Watzlaf, Valerie J M; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.

  18. Addressing the supply security of the nuclear fuel cycle: a US merchant generator risk acceptance perspective

    International Nuclear Information System (INIS)

    Jordan, R. P.; Benavides, P.A.

    2006-01-01

    With the current rising markets across the nuclear fuel supply spectrum, understanding and managing nuclear fuel cycle supply security risk becomes an increasingly important consideration. In addressing this area, Constellation Energy is implementing an integrated multifaceted approach as consistent with a comprehensive risk profile covering the nuclear fuel supply industry. This approach is founded on use of a utility traditional procurement strategy, as dependent on the qualitative parameters of supply origination diversification, geopolitical stability, contracting duration and individual supplier financial bases. However, Constellation also adds an additional consideration into development of this nuclear fuel supply risk profile. To do such, qualitative assessments covering specific supplier risks, as based on the parameters of supplier management and organizational structure, design capacities (applicable to fabrication and enrichment only), operational history as applicable to forward-looking performance, regulatory or legal history and financial performance are also considered. Constellation overlays the risks of future availabilities, catastrophic occurrences and prices for each nuclear fuel material and service component onto a quantitative set of results. The overall focus of these assessments is the creation of a risk management perspective directed towards determining the potential loss or delay of nuclear fuel supply for our operating reactors. The conclusion of this effort is an integrated assessment of the nuclear fuel supply security as applicable to the Constellation-specific structured risk profile. Use of this assessment allows Constellation to target appropriate suppliers of interest in the marketplace and form the fundamental bases for the Constellation procurement strategy while managing risks associated with nuclear fuel cycle supply security. (authors)

  19. You Outsource the Service but Not the Risk: Supply Chain Risk Management for the Cyber Security of Safety Critical Systems

    OpenAIRE

    Johnson, Chris W.

    2016-01-01

    Companies increasingly form interdependent relationships between contractors and sub-contractors that extend\\ud across national borders and legal jurisdictions. In consequence, supply chain risk management (SCRM) is an\\ud increasing concern for the cyber security of safety-critical systems. The following pages argue that outsourcing\\ud undermines SCRM by eroding technical expertise, which companies need to select and audit their suppliers. They\\ud are still held accountable when the failure o...

  20. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  1. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  2. Multi-risk infants: predicting attachment security from sociodemographic, psychosocial, and health risk among African-American preterm infants.

    Science.gov (United States)

    Candelaria, Margo; Teti, Douglas M; Black, Maureen M

    2011-08-01

    Ecological and transactional theories link child outcomes to accumulated risk. This study hypothesized that cumulative risk was negatively related to attachment, and that maternal sensitivity mediated linkages between risk and attachment. One hundred and twelve high-risk African-American premature infant-mother dyads participated. Psychosocial (maternal depression, stress and self-efficacy) and sociodemographic risk (poverty, maternal education, marital status) were maternal self-report (0-4 months). Infant health risk was obtained from hospital charts. Infant-mother attachment (12 months) and maternal sensitivity (4 months) were assessed with Q-sort measures. Psychosocial and sociodemographic risk, but not infant health risk, negatively related to attachment. Both were mediated by maternal sensitivity. The impact of risk domains on attachment security was mediated by maternal sensitivity. Results emphasize the need for early intervention programs targeting premature infants to identify and address environmental and personal factors that place parenting at risk. © 2011 The Authors. Journal of Child Psychology and Psychiatry © 2011 Association for Child and Adolescent Mental Health.

  3. Security and Risk Analysis of Nuclear Safeguards Instruments Using Attack Trees

    International Nuclear Information System (INIS)

    Naumann, I.; Wishard, B.

    2015-01-01

    The IAEA's nuclear safeguards instruments must be frequently evaluated against attack vectors, which are extremely varied and, at first approximation, may seem inconsequential, but are not. To accurately analyze the impact of attacks on a multi-component system requires a highly structured and well-documented assessment. Tree structures, such as fault trees, have long been used to assess the consequences of selecting potential solutions and their impact on risk. When applied to security threats by introducing threat agents (adversaries) and vulnerabilities, this approach can be extremely valuable in uncovering previously unidentified risks and identifying mitigation steps. This paper discusses how attack trees can be used for the security analysis of nuclear safeguards instruments. The root node of such a tree represents an objective that negatively impacts security such as disclosing and/or falsifying instrument data or circumventing safeguards methods. Usually, this objective is rather complex and attaining it requires a combination of several security breaches which may vary on how much funding or what capabilities are required in order to execute them. Thus, it is necessary to break the root objective into smaller, less complex units. Once a leaf node describes a reasonably comprehensible action, it is the security experts' task to allocate levels of difficulty and funding to this node. Eventually, the paths from the leaf nodes to the root node describe all possible combinations of actions necessary to carry out a successful attack. The use of a well-structured attack tree facilitates the developer in thinking like the adversary providing more effective security solutions. (author)

  4. Assessing and managing security risk in IT systems a structured methodology

    CERN Document Server

    McCumber, John

    2004-01-01

    SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relatio

  5. Environmental and climate security: improving scenario methodologies for science and risk assessment

    Science.gov (United States)

    Briggs, C. M.; Carlsen, H.

    2010-12-01

    Governments and popular discussions have increasingly referred to concepts of ‘climate security’, often with reference to IPCC data. Development of effective methodologies to translate complex, scientific data into risk assessments has lagged, resulting in overly simplistic political assumptions of potential impacts. Climate security scenarios have been developed for use by security and military agencies, but effective engagement by scientific communities requires an improved framework. Effective use of data requires improvement both of climate projections, and the mapping of cascading impacts across interlinked, complex systems. In this research we propose a process for systematic generation of subsets of scenarios (of arbitrary size) from a given set of variables with possible interlinkages. The variables could include climatic changes as well as other global changes of concerns in a security context. In coping with possible challenges associated with the nexus of climate change and security - where deep structural uncertainty and possible irreversible changes are of primary interest - it is important to explore the outer limits of the relevant uncertainties. Therefore the proposed process includes a novel method that will help scenario developers in generating scenario sets where the scenarios are in a quantifiable sense maximally different and therefore best ‘span’ the whole set of scenarios. When downscaled onto a regional level, this process can provide guidance to potentially significant and abrupt geophysical changes, where high uncertainty has often prevented communication of risks. Potential physical changes can then be used as starting points for mapping cascading effects across networks, including topological analysis to identify critically vulnerable nodes and fragile systems, the existence of positive or negative feedback loops, and possible intervention points. Advanced knowledge of both potential geo-physical shifts and related non

  6. How to Quantify Deterrence and Reduce Critical Infrastructure Risk

    OpenAIRE

    Taquechel, Eric F.; Lewis, Ted G.

    2012-01-01

    This article appeared in Homeland Security Affairs (August 2012), v.8, article 12 "We propose a definition of critical infrastructure deterrence and develop a methodology to explicitly quantify the deterrent effects of critical infrastructure security strategies. We leverage historical work on analyzing deterrence, game theory and utility theory. Our methodology quantifies deterrence as the extent to which an attacker's expected utility from an infrastructure attack changes after a defende...

  7. Discursive Overlap and Conflictive Fragmentation of Risk and Security in the Geopolitics of Energy

    Directory of Open Access Journals (Sweden)

    Julio E. Rubio

    2013-03-01

    Full Text Available As it touches all aspects of human activity and society in general, energy has become an object of discourse. Two main discourses have formed on the use of energy: risk discourse and security discourse. While environmental changes and oil depletion continue, a new application for the term security has appeared: energy security. This concept can be interpreted within the terms of risk discourse, which is oriented towards rational consensus and decision making, or as an exercise of power, sovereignty and hegemony. The boundaries between interpretations are often unclear. Thus, in an institutional framework that has fragmented principles, norms and rules, opposing discourses will overlap. Political agents and institutions deploy strategies based on these discourses. With this overlapping of discourses, the performative powers of different institutions clash, thus creating conflictive fragmentation in a governance architecture. The purpose of this investigation is to analyze the use of, replication of, and ambiguities surrounding the concept of energy security, so as to understand how and why these discourses overlap and the profound consequences that this overlap may have for present and future energy use, environmental negotiations, and political climate.

  8. Programme for reducing the risk factors due to prenatal exposure

    International Nuclear Information System (INIS)

    Arranz, L.; Ferrer, N.; Sastre, J.M.

    2001-01-01

    When a patient is not aware of her pregnancy, the foetus/embryo may be inadvertently irradiated during a diagnostic exploration or therapeutic intervention. The radiosensitivity of the foetus/embryo changes during the different periods of gestation. For this reason there are different risk factors for each moment at which the patient may suffer irradiation. In the past 7 years, the Department of Radiophysics and Radiation Protection has been consulted 75 times for this reason, to evaluate the dose received in the uterus. Since the establishment of a programme to avoid inadvertent irradiation of the foetus/embryo, these consultations have been reduced. This programme is based on informing the patients and on training the medical staff. (author)

  9. Risk and Argument: A Risk-based Argumentation Method for Practical Security

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Tun, Thein Tan; Yu, Yijun; Wieringa, Roelf J.; Nuseibeh, Bashar

    When showing that a software system meets certain security requirements, it is often necessary to work with formal and informal descriptions of the system behavior, vulnerabilities, and threats from potential attackers. In earlier work, Haley et al. [1] showed structured argumentation could deal

  10. Should We Use PPAR Agonists to Reduce Cardiovascular Risk?

    Directory of Open Access Journals (Sweden)

    Jennifer G. Robinson

    2008-01-01

    Full Text Available Trials of peroxisome proliferator-activated receptor (PPAR agonists have shown mixed results for cardiovascular prevention. Fibrates are PPAR- agonists that act primarily to improve dyslipidemia. Based on low- and high-density lipoprotein cholesterol (LDL and HDL effects, gemfibrozil may be of greater cardiovascular benefit than expected, fenofibrate performed about as expected, and bezafibrate performed worse than expected. Increases in both cardiovascular and noncardiovascular serious adverse events have been observed with some fibrates. Thiazolidinediones (TZDs are PPAR- agonists used to improve impaired glucose metabolism but also influence lipids. Pioglitazone reduces atherosclerotic events in diabetic subjects, but has no net cardiovascular benefit due to increased congestive heart failure risk. Rosiglitazone may increase the risk of atherosclerotic events, and has a net harmful effect on the cardiovascular system when congestive heart failure is included. The primary benefit of TZDs appears to be the prevention of diabetic microvascular complications. Dual PPAR-/ agonists have had unacceptable adverse effects but more selective agents are in development. PPAR- and pan-agonists are also in development. It will be imperative to prove that future PPAR agonists not only prevent atherosclerotic events but also result in a net reduction on total cardiovascular events without significant noncardiovascular adverse effects with long-term use.

  11. Reducing Youth Risk Behaviors Through Interactive Theater Intervention

    Directory of Open Access Journals (Sweden)

    Ryan J. Watson

    2016-02-01

    Full Text Available The reduction of risk behaviors in secondary schools is a key concern for parents, teachers, and school administrators. School is one of the primary contexts of socialization for young people; thus, the investment in school-based programs to reduce risk behaviors is essential. In this study, we report on youth who participated in an intervention designed to improve decision-making skills based on positive youth development approaches. We examine changes in decision-making skills before and after involvement in the Teen Interactive Theater Education (TITE program and retrospective self-assessment of change in knowledge, abilities, and beliefs as a result of participating in TITE (n = 127. Youth that reported increases in knowledge, abilities, and beliefs due to the intervention (n = 89 were more likely to think about the consequences of their decisions and list options before making a decision compared to their counterparts that reported less overall learning (n = 38. Implications for intervention research and stakeholders are discussed.

  12. Security Risks of Cloud Computing and Its Emergence as 5th Utility Service

    Science.gov (United States)

    Ahmad, Mushtaq

    Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.

  13. Global Hotspots of Conflict Risk between Food Security and Biodiversity Conservation

    OpenAIRE

    Molotoks, Amy; Dawson, Terence Peter

    2017-01-01

    The global challenges of food security and biodiversity are rarely addressed together, though recently there has been an increasing awareness that the two issues are closely related. The majority of land available for agriculture is already used for food production, but despite the productivity gains, one in nine people worldwide are classified as food insecure. There is an increasing risk that addressing food insecurity through methods such as agricultural expansion orintensification could l...

  14. Developing a Comprehensive Approach Could Help DOD Better Manage National Security Risks in the Supply Chain

    Science.gov (United States)

    2016-02-01

    supply chains for rare earths.20 According to Industrial Analysis Center officials, only 10 percent of surveys sent to prime contractors for 79...the Supply Chain Report to Congressional Committees February 2016 GAO-16-161 United States Government Accountability Office United...Developing a Comprehensive Approach Could Help DOD Better Manage National Security Risks in the Supply Chain Why GAO Did This Study DOD depends on

  15. Policy risk in action: pension reforms and social security wealth in Hungary, Czech Republic, and Slovakia

    Czech Academy of Sciences Publication Activity Database

    Dušek, Libor; Kopecsni, J.

    2008-01-01

    Roč. 58, 7-8 (2008), s. 329-358 ISSN 0015-1920 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : pension reforms * social security * policy risk Subject RIV: AH - Economics Impact factor: 0.275, year: 2008 http://journal.fsv.cuni.cz/storage/1137_dusek-kopecsni_-_329-358-opravené.pdf

  16. Initiatives to Reduce Earthquake Risk of Developing Countries

    Science.gov (United States)

    Tucker, B. E.

    2008-12-01

    The seventeen-year-and-counting history of the Palo Alto-based nonprofit organization GeoHazards International (GHI) is the story of many initiatives within a larger initiative to increase the societal impact of geophysics and civil engineering. GHI's mission is to reduce death and suffering due to earthquakes and other natural hazards in the world's most vulnerable communities through preparedness, mitigation and advocacy. GHI works by raising awareness in these communities about their risk and about affordable methods to manage it, identifying and strengthening institutions in these communities to manage their risk, and advocating improvement in natural disaster management. Some of GHI's successful initiatives include: (1) creating an earthquake scenario for Quito, Ecuador that describes in lay terms the consequences for that city of a probable earthquake; (2) improving the curricula of Pakistani university courses about seismic retrofitting; (3) training employees of the Public Works Department of Delhi, India on assessing the seismic vulnerability of critical facilities such as a school, a hospital, a police headquarters, and city hall; (4) assessing the vulnerability of the Library of Tibetan Works and Archives in Dharamsala, India; (5) developing a seismic hazard reduction plan for a nonprofit organization in Kathmandu, Nepal that works to manage Nepal's seismic risk; and (6) assisting in the formulation of a resolution by the Council of the Organization for Economic Cooperation and Development (OECD) to promote school earthquake safety among OECD member countries. GHI's most important resource, in addition to its staff and Board of Trustees, is its members and volunteer advisors, who include some of the world's leading earth scientists, earthquake engineers, urban planners and architects, from the academic, public, private and nonprofit sectors. GHI is planning several exciting initiatives in the near future. One would oversee the design and construction of

  17. Methodology for Applying Cyber Security Risk Evaluation from BN Model to PSA Model

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Youngin (Korea, Republic of); Kang, Hyun Gook [KAIST, Dajeon (Korea, Republic of); Son, Han Seong [Joongbu University, Chubu (Korea, Republic of)

    2014-08-15

    There are several advantages to use digital equipment such as cost, convenience, and availability. It is inevitable to use the digital I and C equipment replaced analog. Nuclear facilities have already started applying the digital system to I and C system. However, the nuclear facilities also have to change I and C system even though it is difficult to use digital equipment due to high level of safety, irradiation embrittlement, and cyber security. A cyber security which is one of important concerns to use digital equipment can affect the whole integrity of nuclear facilities. For instance, cyber-attack occurred to nuclear facilities such as the SQL slammer worm, stuxnet, DUQU, and flame. The regulatory authorities have published many regulatory requirement documents such as U.S. NRC Regulatory Guide 5.71, 1.152, IAEA guide NSS-17, IEEE Standard, and KINS Regulatory Guide. One of the important problem of cyber security research for nuclear facilities is difficulty to obtain the data through the penetration experiments. Therefore, we make cyber security risk evaluation model with Bayesian network (BN) for nuclear reactor protection system (RPS), which is one of the safety-critical systems to trip the reactor when the accident is happened to the facilities. BN can be used for overcoming these problems. We propose a method to apply BN cyber security model to probabilistic safety assessment (PSA) model, which had been used for safety assessment of system, structure and components of facility. The proposed method will be able to provide the insight of safety as well as cyber risk to the facility.

  18. Methodology for Applying Cyber Security Risk Evaluation from BN Model to PSA Model

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Kang, Hyun Gook; Son, Han Seong

    2014-01-01

    There are several advantages to use digital equipment such as cost, convenience, and availability. It is inevitable to use the digital I and C equipment replaced analog. Nuclear facilities have already started applying the digital system to I and C system. However, the nuclear facilities also have to change I and C system even though it is difficult to use digital equipment due to high level of safety, irradiation embrittlement, and cyber security. A cyber security which is one of important concerns to use digital equipment can affect the whole integrity of nuclear facilities. For instance, cyber-attack occurred to nuclear facilities such as the SQL slammer worm, stuxnet, DUQU, and flame. The regulatory authorities have published many regulatory requirement documents such as U.S. NRC Regulatory Guide 5.71, 1.152, IAEA guide NSS-17, IEEE Standard, and KINS Regulatory Guide. One of the important problem of cyber security research for nuclear facilities is difficulty to obtain the data through the penetration experiments. Therefore, we make cyber security risk evaluation model with Bayesian network (BN) for nuclear reactor protection system (RPS), which is one of the safety-critical systems to trip the reactor when the accident is happened to the facilities. BN can be used for overcoming these problems. We propose a method to apply BN cyber security model to probabilistic safety assessment (PSA) model, which had been used for safety assessment of system, structure and components of facility. The proposed method will be able to provide the insight of safety as well as cyber risk to the facility

  19. Risk Informed Approach for Nuclear Security Measures for Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to States for developing a risk informed approach and for conducting threat and risk assessments as the basis for the design and implementation of sustainable nuclear security systems and measures for prevention of, detection of, and response to criminal and intentional unauthorised acts involving nuclear and other radioactive material out of regulatory control. It describes concepts and methodologies for a risk informed approach, including identification and assessment of threats, targets, and potential consequences; threat and risk assessment methodologies, and the use of risk informed approaches as the basis for informing the development and implementation of nuclear security systems and measures. The publication is an Implementing Guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, law enforcement agencies and experts from competent authorities and other relevant organizations involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures related to nuclear and other radioactive material out of regulatory control

  20. Framework for generating expert systems to perform computer security risk analysis

    International Nuclear Information System (INIS)

    Smith, S.T.; Lim, J.J.

    1985-01-01

    At Los Alamos we are developing a framework to generate knowledge-based expert systems for performing automated risk analyses upon a subject system. The expert system is a computer program that models experts' knowledge about a topic, including facts, assumptions, insights, and decision rationale. The subject system, defined as the collection of information, procedures, devices, and real property upon which the risk analysis is to be performed, is a member of the class of systems that have three identifying characteristics: a set of desirable assets (or targets), a set of adversaries (or threats) desiring to obtain or to do harm to the assets, and a set of protective mechanisms to safeguard the assets from the adversaries. Risk analysis evaluates both vulnerability to and the impact of successful threats against the targets by determining the overall effectiveness of the subject system safeguards, identifying vulnerabilities in that set of safeguards, and determining cost-effective improvements to the safeguards. As a testbed, we evaluate the inherent vulnerabilities and risks in a system of computer security safeguards. The method considers safeguards protecting four generic targets (physical plant of the computer installation, its hardware, its software, and its documents and displays) against three generic threats (natural hazards, direct human actions requiring the presence of the adversary, and indirect human actions wherein the adversary is not on the premises-perhaps using such access tools as wiretaps, dialup lines, and so forth). Our automated procedure to assess the effectiveness of computer security safeguards differs from traditional risk analysis methods

  1. [Security of hospital infusion practices: From an a priori risk analysis to an improvement action plan].

    Science.gov (United States)

    Pignard, J; Cosserant, S; Traore, O; Souweine, B; Sautou, V

    2016-03-01

    Infusion in care units, and all the more in intensive care units, is a complex process which can be the source of many risks for the patient. Under cover of an institutional approach for the improvement of the quality and safety of patient healthcare, a risk mapping infusion practices was performed. The analysis was focused on intravenous infusion situations in adults, the a priori risk assessment methodology was applied and a multidisciplinary work group established. Forty-three risks were identified for the infusion process (prescription, preparation and administration). The risks' assessment and the existing means of control showed that 48% of them would have a highly critical patient security impact. Recommendations were developed for 20 risks considered to be most critical, to limit their occurrence and severity, and improve their control level. An institutional action plan was developed and validated in the Drug and Sterile Medical Devices Commission. This mapping allowed the realization of an exhaustive inventory of potential risks associated with the infusion. At the end of this work, multidisciplinary groups were set up to work on different themes and regular quarterly meetings were established to follow the progress of various projects. Risk mapping will be performed in pediatric and oncology unit where the risks associated with the handling of toxic products is omnipresent. Copyright © 2015 Académie Nationale de Pharmacie. Published by Elsevier Masson SAS. All rights reserved.

  2. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  3. Top management turnover and firm default risk: Evidence from the Chinese securities market

    Directory of Open Access Journals (Sweden)

    Wei Ting

    2011-06-01

    Full Text Available China has moved rapidly from a socialist planned economy to a market economy. As a result, many enterprises in China are seeking talented top management to increase their performance and decrease their default risk. Studies abound regarding top management turnover and its relationship with firm performance, however, few studies have connected top management turnover with firm default risk. In China, a market with extensive financial fraud, firm default risk is an important factor and thus we explore this relationship in the Chinese securities market. Our results indicate that firms with higher default risk are more likely to change their top management in the next financial reporting period. In addition, following changes in top management, such firms default less than other companies.

  4. Top management turnover and firm default risk:Evidence from the Chinese securities market

    Institute of Scientific and Technical Information of China (English)

    Wei; Ting

    2011-01-01

    China has moved rapidly from a socialist planned economy to a market economy.As a result,many enterprises in China are seeking talented top management to increase their performance and decrease their default risk.Studies abound regarding top management turnover and its relationship with firm performance,however,few studies have connected top management turnover with firm default risk.In China,a market with extensive financial fraud,firm default risk is an important factor and thus we explore this relationship in the Chinese securities market.Our results indicate that firms with higher default risk are more likely to change their top management in the next financial reporting period.In addition,following changes in top management,such firms default less than other companies.

  5. A unified framework for risk and vulnerability analysis covering both safety and security

    International Nuclear Information System (INIS)

    Aven, Terje

    2007-01-01

    Recently, we have seen several attempts to establish adequate risk and vulnerability analyses tools and related management frameworks dealing not only with accidental events but also security problems. These attempts have been based on different analysis approaches and using alternative building blocks. In this paper, we discuss some of these and show how a unified framework for such analyses and management tasks can be developed. The framework is based on the use of probability as a measure of uncertainty, as seen through the eyes of the assessor, and define risk as the combination of possible consequences and related uncertainties. Risk and vulnerability characterizations are introduced incorporating ideas both from vulnerability analyses literature as well as from the risk classification scheme introduced by Renn and Klinke

  6. Front end of the nuclear fuel cycle: options to reduce the risks of terrorism and proliferation

    International Nuclear Information System (INIS)

    Greenberg, E.V.C.; Hoenig, M.M.

    1987-01-01

    The authors' assessment of the prospects for advanced front end technologies and fuel assurances becoming effective mechanisms for achieving nonproliferation and antiterrorism objectives is relatively pessimistic unless they are integrated with back end accommodations such as the return of spent fuel. They recommend that further examination of front end assurances be linked to that accommodation. To be sure, certain real technological improvements may postpone the day when commercial use of nuclear explosive fuels, with all their attendant terrorism and proliferation risks, is justified. Indeed, improvements in LWRs, using well-understood technology combined with advanced enrichment techniques, could reduce uranium requirements up to 45% at the beginning of the next century and up to 30% a decade earlier, provided the economic and security incentives are present. On the institutional side, existing supply conditions put little pressure on importing countries to seek long-term supply assurances. Moreover, the political obstacles to creating new international institutions or arrangements are exceedingly difficult to overcome, especially without a heightened consciousness of the growing risks of civilian explosive nuclear materials and the political will to make these risks a high priority. 2 tables

  7. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  8. The KnowRISK project: Tools and strategies to reduce non-structural damage

    Science.gov (United States)

    Sousa Oliveira, Carlos; Lopes, Mário; Mota de Sá, Francisco; Amaral Ferreia, Mónica; Candeias, Paulo; Campos Costa, Alfredo; Rupakhety, Rajesh; Meroni, Fabrizio; Azzaro, Raffaele; D'Amico, Salvatore; Langer, Horst; Musacchio, Gemma; Sousa Silva, Delta; Falsaperla, Susanna; Scarfì, Luciano; Tusa, Giuseppina; Tuvé, Tiziana

    2016-04-01

    The project KnowRISK (Know your city, Reduce seISmic risK through non-structural elements) is financed by the European Commission to develop prevention measures that may reduce non-structural damage in urban areas. Pilot areas of the project are within the three European participating countries, namely Portugal, Iceland and Italy. Non-structural components of a building include all those components that are not part of the structural system, more specifically the architectural, mechanical, electrical, and plumbing systems, as well as furniture, fixtures, equipment, and contents. Windows, partitions, granite veneer, piping, ceilings, air conditioning ducts and equipment, elevators, computer and hospital equipment, file cabinets, and retail merchandise are all examples of non-structural components that are vulnerable to earthquake damage. We will use the experience gained during past earthquakes, which struck in particular Iceland, Italy and Portugal (Azores). Securing the non-structural elements improves the safety during an earthquake and saves lives. This paper aims at identifying non-structural seismic protection measures in the pilot areas and to develop a portfolio of good practices for the most common and serious non-structural vulnerabilities. This systematic identification and the portfolio will be achieved through a "cross-knowledge" strategy based on previous researches, evidence of non-structural damage in past earthquakes. Shake table tests of a group of non-structural elements will be performed. These tests will be filmed and, jointly with portfolio, will serve as didactic supporting tools to be used in workshops with building construction stakeholders and in risk communication activities. A Practical Guide for non-structural risk reduction will be specifically prepared for citizens on the basis of the outputs of the project, taking into account the local culture and needs of each participating country.

  9. Risk-informed approach for safety, safeguards, and security (3S) by design

    International Nuclear Information System (INIS)

    Suzuki, Mitsutoshi; Burr, Tom; Howell, John

    2011-01-01

    Over several decades the nuclear energy society worldwide has developed safety assessment methodology based on probabilistic risk analysis for incorporating its benefit into design and accident prevention for nuclear reactors. Although safeguards and security communities have different histories and technical aspects compared to safety, risk assessment as a supplement to their current requirements could be developed to promote synergism between Safety, Safeguards, and Security (3S) and to install effective countermeasures in the design of complex nuclear fuel cycle facilities. Since the 3S initiative was raised by G8 countries at Hokkaido Toyako-Summit in 2008, one approach to developing synergism in a 3S By Design (3SBD) process has been the application of risk-oriented assessment methodology. In the existing regulations of safeguards and security, a risk notion has already been considered for inherent threat and hazard recognition. To integrate existing metrics into a risk-oriented approach, several mathematical methods have already been surveyed, with attention to the scarcity of intentional acts in the case of safeguards and the sparseness of actual event data. A two-dimensional probability distribution composed of measurement error and incidence probabilities has been proposed to formalize inherent difficulties in the International Atomic Energy Agency (IAEA) safeguards criteria. In particular, the incidence probability that is difficult to estimate has been explained using a Markov model and game theory. In this work, a feasibility study of 3SBD is performed for an aqueous reprocessing process, and synergetic countermeasures are presented for preliminary demonstration of 3SBD. Although differences and conflicts between individual 'S' communities exist, the integrated approach would be valuable for optimization and balance between the 3S design features as well as for effective and efficient implementation under existing regulation frameworks. In addition

  10. Startup circuit training program reduces metabolic risk in Latino adolescents.

    Science.gov (United States)

    Davis, Jaimie Nicole; Gyllenhammer, Lauren E; Vanni, Amanda A; Meija, Mathew; Tung, Amy; Schroeder, E Todd; Spruijt-Metz, Donna; Goran, Michael I

    2011-11-01

    This study aimed to test the effects of a circuit training (CT; aerobic + strength training) program, with and without motivational interviewing (MI) behavioral therapy, on reducing adiposity and type 2 diabetes risk factors in Latina teenagers. Thirty-eight Latina adolescents (15.8 ± 1.1 yr) who are overweight/obese were randomly assigned to control (C; n = 12), CT (n = 14), or CT + MI (n = 12). The CT classes were held twice a week (60-90 min) for 16 wk. The CT + MI group also received individual or group MI sessions every other week. The following were measured before and after intervention: strength by one-repetition maximum; cardiorespiratory fitness (V·O 2max) by submaximal treadmill test; physical activity by accelerometry; dietary intake by records; height, weight, waist circumference; total body composition by dual-energy x-ray absorptiometry; visceral adipose tissue, subcutaneous adipose tissue, and hepatic fat fraction by magnetic resonance imaging; and glucose/insulin indices by fasting blood draw. Across-intervention group effects were tested using repeated-measures ANOVA with post hoc pairwise comparisons. CT and CT + MI participants, compared with controls, significantly increased fitness (+16% and +15% vs -6%, P = 0.03) and leg press (+40% vs +20%, P = 0.007). Compared with controls, CT participants also decreased waist circumference (-3% vs +3%; P < 0.001), subcutaneous adipose tissue (-10% vs 8%, P = 0.04), visceral adipose tissue (-10% vs +6%, P = 0.05), fasting insulin (-24% vs +6%, P = 0.03), and insulin resistance (-21% vs -4%, P = 0.05). CT may be an effective starter program to reduce fat depots and improve insulin resistance in Latino youth who are overweight/obese, whereas the additional MI therapy showed no additive effect on these health outcomes.

  11. Development of information security and vulnerability risk management system for J-PARC

    International Nuclear Information System (INIS)

    Ishikawa, Hiroyuki; Tate, Akihiro; Murakami, Tadashi

    2012-02-01

    In J-PARC (Japan Proton Accelerator Research Complex) we have set up intra-network (internal network, we will abbreviate it as JLAN, below) to support research activity and communication among users. In JLAN, we set up various kinds of security devices to keep JLAN secure. However, the servers which provide information or service to public are still in danger of being accessed illegally. If there is an illegal access, that may cause defacement of data or information leak. Furthermore, the victim servers are manipulated by the malicious attackers, and they themselves attack the external information equipments. Vulnerability of servers enables unauthorized access. So, vulnerability test with use of a vulnerability tool is one of the most effective ways to take measures for vulnerability of the equipments. However, it is not enough to just conduct a vulnerability test. It is also essential for information security to take measures to cover constantly for the vulnerability of servers. We focused on the points above, and developed the vulnerability testing system for security. It is not only a testing tool for the vulnerability of servers, but also management system which enables the server administrators in charge of taking measures for vulnerabilities to manage risks and handles PDCA (Plan-Do-Check-Action) cycles as countermeasure for vulnerability. In this paper, we report the technologies and ingenuities for the development of the above system. (author)

  12. SECTOR-SPECIFIC STRUCTURE OF THE REGIONAL ECONOMY AS A FACTOR OF ELEVATION OF RISKS TO ITS ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    Rostislav BILYK

    2016-07-01

    Full Text Available The article analyzes a sector-specific specialization of the regional economy in Ukraine. It also reveals possibility and conditions of transformation of a sector-specific specialization of the region and risks to its economic security. The article suggests an assessment of influence of a sector-specific specialization on occurrence of threats to the economic security of the region.

  13. Use of risk assessment methods for security design and analysis of nuclear and radioactive facilities

    International Nuclear Information System (INIS)

    Vasconcelos, Vanderley de; Andrade, Marcos C.; Jordao, Elizabete

    2011-01-01

    The objective of this work is to evaluate the applicability of risk assessment methods for analyzing the physical protection of nuclear and radioactive facilities. One of the important processes for physical protection in nuclear and radioactive facilities is the identifying of areas containing nuclear materials, structures, systems or components to be protected from sabotage, which could directly or indirectly lead to unacceptable radiological consequences. A survey of the international guidelines and recommendations about vital area identification, design basis threat (DBT), and the security of nuclear and radioactive facilities was carried out. The traditional methods used for quantitative risk assessment, like FMEA (Failure Mode and Effect Analysis), Event and Decision Trees, Fault and Success Trees, Vulnerability Assessment, Monte Carlo Simulation, Probabilistic Safety Assessment, Scenario Analysis, and Game Theory, among others, are highlighted. The applicability of such techniques to security issues, their pros and cons, the general resources needed to implement them, as data or support software, are analyzed. Finally, an approach to security design and analysis, beginning with a qualitative and preliminary examination to determine the range of possible scenarios, outcomes, and the systems to be included in the analyses, and proceeding to a progressively use of more quantitative techniques is presented. (author)

  14. Sustainable Survival for adolescents living with HIV: do SDG-aligned provisions reduce potential mortality risk?

    Science.gov (United States)

    Cluver, Lucie; Pantelic, Marija; Orkin, Mark; Toska, Elona; Medley, Sally; Sherr, Lorraine

    2018-02-01

    The Sustainable Development Goals (SDGs) present a groundbreaking global development agenda to protect the most vulnerable. Adolescents living with HIV in Sub-Saharan Africa continue to experience extreme health vulnerabilities, but we know little about the impacts of SDG-aligned provisions on their health. This study tests associations of provisions aligned with five SDGs with potential mortality risks. Clinical and interview data were gathered from N = 1060 adolescents living with HIV in rural and urban South Africa in 2014 to 2015. All ART-initiated adolescents from 53 government health facilities were identified, and traced in their communities to include those defaulting and lost-to-follow-up. Potential mortality risk was assessed as either: viral suppression failure (1000+ copies/ml) using patient file records, or adolescent self-report of diagnosed but untreated tuberculosis or symptomatic pulmonary tuberculosis. SDG-aligned provisions were measured through adolescent interviews. Provisions aligned with SDGs 1&2 (no poverty and zero hunger) were operationalized as access to basic necessities, social protection and food security; An SDG 3-aligned provision (ensure healthy lives) was having a healthy primary caregiver; An SDG 8-aligned provision (employment for all) was employment of a household member; An SDG 16-aligned provision (protection from violence) was protection from physical, sexual or emotional abuse. Research partners included the South African national government, UNICEF and Pediatric and Adolescent Treatment for Africa. 20.8% of adolescents living with HIV had potential mortality risk - i.e. viral suppression failure, symptomatic untreated TB, or both. All SDG-aligned provisions were significantly associated with reduced potential mortality risk: SDG 1&2 (OR 0.599 CI 0.361 to 0.994); SDG 3 (OR 0.577 CI 0.411 to 0.808); SDG 8 (OR 0.602 CI 0.440 to 0.823) and SDG 16 (OR 0.686 CI 0.505 to 0.933). Access to multiple SDG-aligned provisions showed a

  15. Controls Mitigating the Risk of Confidential Information Disclosure by Facebook: Essential Concern in Auditing Information Security

    Directory of Open Access Journals (Sweden)

    Ivan Ognyanov Kuyumdzhiev

    2014-08-01

    Full Text Available Facebook allows people to easily share information about themselves which in some cases could be classified as confidential or sensitive in the organisation they’re working for. In this paper we discuss the type of data stored by Facebook and the scope of the terms “confidential” and “sensitive data”. The intersection of these areas shows that there is high possibility for confidential data disclosure in organisations with none or ineffective security policy. This paper proposes a strategy for managing the risks of information leakage. We define five levels of controls against posting non-public data on Facebook - security policy, applications installed on employees’ workstations, specific router software or firmware, software in the cloud, Facebook itself. Advantages and disadvantages of every level are evaluated. As a result we propose developing of new control integrated in the social media.

  16. Federal securities law and the need to disclose the risk of canceling nuclear plant

    International Nuclear Information System (INIS)

    Sponseller, D.

    1984-01-01

    Almost every electric utility company involved in nuclear plant construction has experienced difficulty as a result of the deteriorating condition of the nuclear industry as a whole. The thrust of a growing number of lawsuits brought against electric companies for alleged violations of federal securities laws is that the companies failed to reveal cost overruns, delays, and the risk of cancellation and write-off of nuclear plants in their annual reports and registration statements. A review of several suits and the disclosure requirements of securities statutes concludes that, although investors have known about utility problems, they have just become aware this year that the entire financial viability of the electric companies is threatened

  17. Information security governance: a risk assessment approach to health information systems protection.

    Science.gov (United States)

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  18. Improving neurosurgical communication and reducing risk and registrar burden using a novel online database referral platform.

    Science.gov (United States)

    Matloob, Samir A; Hyam, Jonathan A; Thorne, Lewis; Bradford, Robert

    2016-01-01

    Documentation of urgent referrals to neurosurgical units and communication with referring hospitals is critical for effective handover and appropriate continuity of care within a tertiary service. Referrals to our neurosurgical unit were audited and we found that the majority of referrals were not documented and this led to more calls to the on-call neurosurgery registrar regarding old referrals. We implemented a new referral system in an attempt to improve documentation of referrals, communication with our referring hospitals and to professionalise the service we offer them. During a 14-day period, number of bleeps, missed bleeps, calls discussing new referrals and previously processed referrals were recorded. Whether new referrals were appropriately documented and referrers received a written response was also recorded. A commercially provided secure cloud-based data archiving telecommunications and database platform for referrals was subsequently introduced within the Trust and the questionnaire repeated during another 14-day period 1 year after implementation. Missed bleeps per day reduced from 16% (SD ± 6.4%) to 9% (SD ± 4.8%; df = 13, paired t-tests p = 0.007) and mean calls per day clarifying previous referrals reduced from 10 (SD ± 4) to 5 (SD ± 3.5; df = 13, p = 0.003). Documentation of new referrals increased from 43% (74/174) to 85% (181/210), and responses to referrals increased from 74% to 98%. The use of a secure cloud-based data archiving telecommunications and database platform significantly increased the documentation of new referrals. This led to fewer missed bleeps and fewer calls about old referrals for the on call registrar. This system of documenting referrals results in improved continuity of care for neurosurgical patients, a significant reduction in risk for Trusts and a more efficient use of Registrar time.

  19. Evaluation of Cyber Security and Modelling of Risk Propagation with Petri Nets

    Directory of Open Access Journals (Sweden)

    Marcin Szpyrka

    2017-02-01

    Full Text Available This article presents a new method of risk propagation among associated elements. On thebasis of coloured Petri nets, a new class called propagation nets is defined. This class providesa formal model of a risk propagation. The proposed method allows for model relations betweennodes forming the network structure. Additionally, it takes into account the bidirectional relationsbetween components as well as relations between isomorphic, symmetrical components in variousbranches of the network. This method is agnostic in terms of use in various systems and it canbe adapted to the propagation model of any systems’ characteristics; however, it is intentionallyproposed to assess the risk of critical infrastructures. In this paper, as a proof of concept example, weshow the formal model of risk propagation proposed within the project Cyberspace Security ThreatsEvaluation System of the Republic of Poland. In the article, the idea of the method is presented aswell as its use case for evaluation of risk for cyber threats. With the adaptation of Petri nets, it ispossible to evaluate the risk for the particular node and assess the impact of this risk for all relatednodes including hierarchic relations of components as well as isomorphism of elements.

  20. A Cyber Security Risk Assessment Procedure for Digital I and C Systems in NPPs

    International Nuclear Information System (INIS)

    Song, J. G.; Lee, J. W.; Lee, C. K.; Kwon, K. C.; Lee, D. Y.

    2011-01-01

    Digital Instrumentation and Control (I and C) systems in nuclear power plants (NPPs) use general digital technologies similar to those used in IT systems. However, one of significant differences between the two systems resides in the duration of their service life. The I and C systems in NPPs operate for more than 20 years. IT systems, on the other hand, are in service for about 3 to 5 years. Hence, a one-time risk assessment for IT systems is normally acceptable. In contrast, the risk assessment for the I and C systems in NPPs should be recursively performed during their longer operation life. A recursive procedure for cyber security risk assessment of the I and C systems in NPPs is studied and proposed in this paper

  1. A Cyber Security Risk Assessment Procedure for Digital I and C Systems in NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Song, J. G.; Lee, J. W.; Lee, C. K.; Kwon, K. C.; Lee, D. Y. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2011-10-15

    Digital Instrumentation and Control (I and C) systems in nuclear power plants (NPPs) use general digital technologies similar to those used in IT systems. However, one of significant differences between the two systems resides in the duration of their service life. The I and C systems in NPPs operate for more than 20 years. IT systems, on the other hand, are in service for about 3 to 5 years. Hence, a one-time risk assessment for IT systems is normally acceptable. In contrast, the risk assessment for the I and C systems in NPPs should be recursively performed during their longer operation life. A recursive procedure for cyber security risk assessment of the I and C systems in NPPs is studied and proposed in this paper

  2. Vaginal delivery to reduce the risk of hypothermia to newborn

    Science.gov (United States)

    Zulala, Nuli Nuryanti; Sitaresmi, Mei Neni; Sulistyaningsih

    2017-08-01

    The prevalence of hypothermia in the world is in the range of 8.5% to 52%, while in Indonesia it is around 47%. Hypothermia has caused 6.3% of neonatal deaths. The method in the process of giving birth determines the way to take care of the newborn. This study aims to observe the effect of the method of delivery on the hypothermia in newborn. This research has obtained an approval from the Ethics Committee of Aisyiyah University, Yogyakarta. This prospective cohort study was conducted to 74 newborns in November 2016. The research subjects were divided into the group of Caesarian section (n = 28) and the group of vaginal delivery (n = 46). Axillary temperature was measured using a digital thermometer at 1st minute, 30th minute, 60th minute, 6th hour, 12th hour and 24th hour. The average temperature difference between the caesarian section group and vaginal delivery group at the 1st minute was at 36°C vs. 36.4° C, at 30th minute at 35.7°C vs. 36.5°C, at 60th minute at 36°C vs. 36.5°C), at 6th hour at 36.2 °C vs. 36.6°C), 12th hour at 36.4°C vs. 36.7°C, and at 24th hour at 36.7°C vs. 36.8°C. The results of the study showed that vaginal delivery could reduce the risk of hypothermia by 1.5 times compared to caesarian section (ρ-value 0.004 CI 95% 1.154 to 1.880)

  3. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  4. The Risks of Strategic Decisions in the Sphere of Financial and Economic Security of Public-Private Partnership

    Directory of Open Access Journals (Sweden)

    Solodovnik Olesia O.

    2017-06-01

    Full Text Available The article is aimed at studying and substantiating the theoretical and methodological aspects of development, analysis and assessment of strategic decisions in the sphere of financial and economic security of public-private partnership (PPP in the context of the risks of their implementation. A study on the essence and characteristics of strategic decisions in the sphere of financial and economic security of PPP has led to the conclusion that each such decision should be considered and assessed in the context of the risks of its implementation, and the risk theory could be seen as the scientific basis for defining strategic alternatives and developing a criteria base for assessing them. The article proposes a list and systematization of the PPP risks that allow to: itemize the risks to the external and internal environment of PPP and to identify the prerequisites and sources of threats to the financial and economic interests of parties to the partnership; analyze and evaluate the strategic alternatives for risk distribution among partners in the context of implications for financial and economic security of PPP; determine the risks of achieving the objectives of the strategy for financial and economic security of PPP and to evaluate alternative strategies in terms of partners; account the potential occurrence and development of systemic risks and threats to the financial and economic security of PPP, as well as the use of complementary protective mechanisms; evaluate the results of a strategy to protect the financial and economic interests of parties to the PPP.

  5. Organizational Policies and Programs to Reduce Job Stress and Risk of Workplace Violence Among K-12 Education Staff.

    Science.gov (United States)

    Landsbergis, Paul; Zoeckler, Jeanette; Kashem, Zerin; Rivera, Bianca; Alexander, Darryl; Bahruth, Amy

    2018-02-01

    We examine strategies, programs, and policies that educators have developed to reduce work stressors and thus health risks. First, we review twenty-seven empirical studies and review papers on organizational programs and policies in K-12 education published from 1990 to 2015 and find some evidence that mentoring, induction, and Peer Assistance and Review programs can increase support, skill development, decision-making authority, and perhaps job security, for teachers-and thus have the potential to reduce job stressors. Second, we describe efforts to reduce workplace violence in Oregon, especially in special education, including legislation, collective bargaining, research, and public awareness. We conclude that to reduce workplace violence, adequate resources are needed for staffing, training, equipment, injury/assault reporting, and investigation. Third, we discuss collective bargaining initiatives that led to mentoring and Peer Assistance and Review and state legislation on prevention of bullying and harassment of school staff. Finally, we present a research agenda on these issues.

  6. A cyber security risk assessment for the design of I and C system in nuclear power plants

    International Nuclear Information System (INIS)

    Song, Jae Gu; Lee, Jung Woon; Lee, Cheal Kwon; Kwon, Kee Choon; Lee, Dong Young

    2012-01-01

    The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the life cycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.

  7. A cyber security risk assessment for the design of I and C system in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jae Gu; Lee, Jung Woon; Lee, Cheal Kwon; Kwon, Kee Choon; Lee, Dong Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2012-12-15

    The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the life cycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.

  8. Execution of a self-directed risk assessment methodology to address HIPAA data security requirements

    Science.gov (United States)

    Coleman, Johnathan

    2003-05-01

    This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.

  9. Risk reducation of nuclear energy and its role in energy mix

    International Nuclear Information System (INIS)

    Tanaka, Satoru

    2013-01-01

    This article was newly written for useful discussion on energy policy based on the lecture at the Japan Science Council symposium 'How to amend energy policy after the Fukushima nuclear accident' held in July 2012. Basic standpoints of energy policy and positioning of nuclear power according to the 2010 energy basic program were reviewed. Nuclear power capacity was expected to increase from 49.5 GWe in 2007 to 68 GWe in 2030 to assure energy security. The accident forced energy policy to be amended starting with nuclear power zero base. The accident actualized the safety risks of nuclear power utilization, which were discussed from fragilities of three areas: (1) design basis, (2) emergency preparedness/response and (3) regulation system. Concrete measures to reduce risks of nuclear disaster were proposed. Role and responsibility of scientists was commented. Trend of energy policy based on basic philosophy selection for three scenarios in 2030 at the lecture time was confirmed and significance of nuclear power utilization was summarized from many-sided view points. (T. Tanaka)

  10. Can rent adjustment clauses reduce the income risk of farms?

    OpenAIRE

    Hotopp, Henning; Mußhoff, Oliver

    2012-01-01

    Risk management is gaining importance in agriculture. In addition to traditional instruments, new risk management instruments are increasingly being proposed. These proposals include the rent adjustment clauses (RACs), which seem to be an unusual instrument at first sight. In contrast with conventional instruments, RACs intentionally allow fixed-cost ‘rent payments’ to fluctuate. We investigate the whole-farm risk reduction potential of different types of RACs via a historical simulation....

  11. Caries Risk Assessment in School Children Using Reduced Cariogram Model

    OpenAIRE

    Taqi, Muhammad; Razak, Ishak Abdul; Ab-Murat, Norintan

    2017-01-01

    Objective: To estimate the percentage of children with low, moderate and high caries risk; and to determine the predictors of caries risk amongst 11-12 year old Pakistani school children. Methods: Subjects’ caries risk was assessed using the Cariogram programme. The survey was done among school children in Bhakkar district of Punjab, Pakistan. Caries and plaque level were assessed using the DMFT and Sillnes and Loe indices respectively, while diet content and frequency were assessed using a t...

  12. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents... SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a...

  13. What we need to know ...and when. Educating the public about nuclear terrorist risks can help raise levels of security

    International Nuclear Information System (INIS)

    Khripunov, I.

    2006-01-01

    all stages of a possible incident. Risk perception and stages in risk communication like public information sharing, public outreach and public involvement are discussed. By getting the public on-board and recognizing it as an important stakeholder, a meaningful risk communication strategy can achieve four interrelated missions: (a) reach a common risk assessment enabling the public to be educated and prepared, (b) encourage a well-informed and well-motivated public to contribute to a healthy nuclear security culture, (c) build up public vigilance, persuading citizens to cooperate more closely with law enforcement, and (d) reduce the immediate and long-term physical and psychological impact of a terrorist incident. Ultimately, it all comes down to creating a more resilient and prepared population in the face of terrorist adversaries. Resilience is usually defined as the ability to handle disruptive challenges, characterized as emergencies that can lead to or result in crisis

  14. Strengthening the Security of ESA Ground Data Systems

    Science.gov (United States)

    Flentge, Felix; Eggleston, James; Garcia Mateos, Marc

    2013-08-01

    A common approach to address information security has been implemented in ESA's Mission Operations (MOI) Infrastructure during the last years. This paper reports on the specific challenges to the Data Systems domain within the MOI and how security can be properly managed with an Information Security Management System (ISMS) according to ISO 27001. Results of an initial security risk assessment are reported and the different types of security controls that are being implemented in order to reduce the risks are briefly described.

  15. Investigation into the risk perceptions of investors in the securities of nuclear-dependent electric utilities

    International Nuclear Information System (INIS)

    Spudeck, R.E.

    1983-01-01

    Two weeks prior to the Three Mile Island accident, March 15, 1979, the Nuclear Regulatory Commission ordered five operating nuclear plants shut down in order to reexamine safety standards in these plants. Reports in the popular and trade press during this time suggested that these events, particularly the accident at Three Mile Island, caused investors in the securities of electric utilities that had nuclear-generation facilities to revise their risk perceptions. This study was designed to examine the impact of both the Nuclear Regulatory Commission order and the accident at Three Mile Island on investor risk perceptions. Selected categories of electric utilities were chosen to examine any differential risk effects resulting from these events. An asset pricing model devoid of many of the restrictive assumptions of more familiar models was used to model investor behavior. The findings suggest that the events described did cause investors to revise upward their perceptions of systematic risk regarding different categories of electric utilities. More specifically, those electric utilities that were operating nuclear plants in 1979 experienced the largest and most sustained increase in systematic risk. However, electric utilities that in 1979 had no operating nuclear plants, but had planned and committed funds for nuclear plants in the future, also experienced increases in systematic risk

  16. Risk in the Clouds?: Security Issues Facing Government Use of Cloud Computing

    Science.gov (United States)

    Wyld, David C.

    Cloud computing is poised to become one of the most important and fundamental shifts in how computing is consumed and used. Forecasts show that government will play a lead role in adopting cloud computing - for data storage, applications, and processing power, as IT executives seek to maximize their returns on limited procurement budgets in these challenging economic times. After an overview of the cloud computing concept, this article explores the security issues facing public sector use of cloud computing and looks to the risk and benefits of shifting to cloud-based models. It concludes with an analysis of the challenges that lie ahead for government use of cloud resources.

  17. Scenario-based approach to risk analysis in support of cyber security

    Energy Technology Data Exchange (ETDEWEB)

    Gertman, D. I.; Folkers, R.; Roberts, J. [Idaho National Laboratory, Roberts and Folkers Associates, LLC, Idaho Falls, ID 83404 (United States)

    2006-07-01

    The US infrastructure is continually challenged by hostile nation states and others who would do us harm. Cyber vulnerabilities and weaknesses are potential targets and are the result of years of construction and technological improvement in a world less concerned with security than is currently the case. As a result, cyber attack presents a class of challenges for which we are just beginning to prepare. What has been done in the nuclear, chemical and energy sectors as a means of anticipating and preparing for randomly occurring accidents and off-normal events is to develop scenarios as a means by which to prioritize and quantify risk and to take action. However, the number of scenarios risk analysts can develop is almost limitless. How do we ascertain which scenario has the greatest merit? One of the more important contributions of probabilistic risk analysis (PRA) has been to quantify the initiating event probability associated with various classes of accidents; and to quantify the occurrence of various conditions, i.e., end-states, as a function of these important accident sequences. Typically, various classes of conditions are represented by scenarios and are quantified in terms of cut sets and binned into end states. For example, the nuclear industry has a well-defined set of initiating events that are studied in assessing risk. The maturation of risk analysis for cyber security from accounting for barriers or looking at conditions statically to one of ascertaining the probability associated with certain events is, in part, dependent upon the adoption of a scenario-based approach. For example, scenarios take into account threats to personnel and public safety; economic damage, and compromises to major operational and safety functions. Scenarios reflect system, equipment, and component configurations as well as key human-system interactions related to event detection, diagnosis, mitigation and restoration of systems. As part of a cyber attack directed toward

  18. Scenario-based approach to risk analysis in support of cyber security

    International Nuclear Information System (INIS)

    Gertman, D. I.; Folkers, R.; Roberts, J.

    2006-01-01

    The US infrastructure is continually challenged by hostile nation states and others who would do us harm. Cyber vulnerabilities and weaknesses are potential targets and are the result of years of construction and technological improvement in a world less concerned with security than is currently the case. As a result, cyber attack presents a class of challenges for which we are just beginning to prepare. What has been done in the nuclear, chemical and energy sectors as a means of anticipating and preparing for randomly occurring accidents and off-normal events is to develop scenarios as a means by which to prioritize and quantify risk and to take action. However, the number of scenarios risk analysts can develop is almost limitless. How do we ascertain which scenario has the greatest merit? One of the more important contributions of probabilistic risk analysis (PRA) has been to quantify the initiating event probability associated with various classes of accidents; and to quantify the occurrence of various conditions, i.e., end-states, as a function of these important accident sequences. Typically, various classes of conditions are represented by scenarios and are quantified in terms of cut sets and binned into end states. For example, the nuclear industry has a well-defined set of initiating events that are studied in assessing risk. The maturation of risk analysis for cyber security from accounting for barriers or looking at conditions statically to one of ascertaining the probability associated with certain events is, in part, dependent upon the adoption of a scenario-based approach. For example, scenarios take into account threats to personnel and public safety; economic damage, and compromises to major operational and safety functions. Scenarios reflect system, equipment, and component configurations as well as key human-system interactions related to event detection, diagnosis, mitigation and restoration of systems. As part of a cyber attack directed toward

  19. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  20. Reducing Disaster Risk through Vulnerability Assessment: An Agricultural Perspective

    Directory of Open Access Journals (Sweden)

    Koos van Zyl

    2006-04-01

    Full Text Available A growing population, economic and environmental losses due to natural or human-made disasters, provides the need for a systematic approach to the management of risks. It is generally accepted that a multi-disciplinary understanding of disaster risk management is required.

  1. Effectiveness of Interventions to Reduce Coronary Heart Disease Risk

    African Journals Online (AJOL)

    Objective: To determine the effectiveness of coronary heart disease risk reduction interventions. Methods: The effects of lipid lowering interventions as well as dietary and lifestyle modifications on some risk factors of CHD were studied retrospectively in 47 males and 53 female patients [aged 33 to 61 years; mean age 47.20 ...

  2. Addressing 2030 EU policy framework for energy and climate: Cost, risk and energy security issues

    International Nuclear Information System (INIS)

    Llano-Paz, Fernando de; Martínez Fernandez, Paulino; Soares, Isabel

    2016-01-01

    The different energy sources, their costs and impacts on the environment determine the electricity production process. Energy planning must solve the existence of uncertainty through the diversification of power generation technologies portfolio. The European Union energy and environmental policy has been mainly based on promoting the security of supply, efficiency, energy savings and the promotion of Renewable Energy Sources. The recent European Commission communication “Towards an European Energy Union: A secure, sustainable, competitive and affordable energy for every European” establishes the path for the European future. This study deals with the analysis of the latest EU “Energy Union” goals through the application of Markowitz portfolio theory considering technological real assets. The EU targets are assessed under a double perspective: economic and environmental. The model concludes that implementing a high share of Renewable Energy target in the design of European Policies is not relevant: the maximization of Renewable Energy share could be achieved considering a sole Low Emissions of carbon dioxide policy. Additionally it is confirmed the need of Nuclear energy in 2030: a zero nuclear energy share in 2030 European Mix is not possible, unless the technological limits participation for Renewable Energy Sources were increased. - Highlights: • Implementing a high RES share target in European Policies could not be relevant. • Maximizing RES share could be achieved considering a sole Low Emissions policy. • The EU 2030 Nuclear energy 50% shutting down could be feasible. • Minimizing risk portfolio presents high diversification and energy security levels.

  3. Fish farming as an innovative strategy for promoting food security in drought risk regions of Zimbabwe

    Directory of Open Access Journals (Sweden)

    Elvin Shava

    2017-11-01

    Full Text Available This article examines the implementation of fish farming as an innovative and economic strategy for promoting food security and dietary diversities among vulnerable households in drought risk areas of Zimbabwe. The declining climatic conditions and lack of economic opportunities in Mwenezi district of Zimbabwe attracted the attention of three nongovernmental organisations (NGOs to implement fish farming as an innovative mechanism to stimulate food security and generate employment in the district. The article used a qualitative research approach that includes semi-structured interviews and secondary data. The purposive sampling technique was adopted to interview participants in Mwenezi district who were involved in fish farming to assess and explore the experiences and benefits they derive from such development projects. Results for the article revealed that fish farming was well embraced by local communities as it led to improvements in food security, household income and employment regeneration. The local government including traditional leadership (Chiefs and Headmen’s supported the NGO activities as they benefited local communities. The article concludes that although fish farming was instrumental in regenerating employment, some participants still fail to participate because of laziness and desire to maintain dependency syndrome. The article recommends the NGOs to launch awareness campaigns in rural communities and increase networking with the donor community which is fundamental in attracting sustainable funding. The government can also promote fish farming in vulnerable rural communities by providing funding and capacity building programmes.

  4. Solution of resource allocation problem for identification of cost-effective measures to reduce nuclear proliferation risks

    International Nuclear Information System (INIS)

    Andrianov, A.; Kuptsov, I.

    2013-01-01

    This report presents a methodology of selection of cost-effective measures to reduce nuclear proliferation risks. The methodology relies on a graded security model used in practice in different applications. The method is based on the controlled finite Markov chain approach set in combination with discrete dynamic programming and MCDM (Multi Criteria Decision Making) techniques that enables the expert to select the cost-effective measures to reduce nuclear proliferation risks depending on availability of resources. The analysis performed with different number of possible measures confirms the conclusions that the implementation of extra-large costs may not produce the required effect, and the increase in resources above a certain level does not appear sensitive. Diversification in improving the effectiveness of other measures seems more rational and efficient for the whole system than the unlimited improvement of the effectiveness of only one measure

  5. Solution of resource allocation problem for identification of cost-effective measures to reduce nuclear proliferation risks

    Energy Technology Data Exchange (ETDEWEB)

    Andrianov, A.; Kuptsov, I. [Obninsk Institute for Nuclear Power Engineering, Studgorodok 1, Obninsk, Kaluga region 249030 (Russian Federation)

    2013-07-01

    This report presents a methodology of selection of cost-effective measures to reduce nuclear proliferation risks. The methodology relies on a graded security model used in practice in different applications. The method is based on the controlled finite Markov chain approach set in combination with discrete dynamic programming and MCDM (Multi Criteria Decision Making) techniques that enables the expert to select the cost-effective measures to reduce nuclear proliferation risks depending on availability of resources. The analysis performed with different number of possible measures confirms the conclusions that the implementation of extra-large costs may not produce the required effect, and the increase in resources above a certain level does not appear sensitive. Diversification in improving the effectiveness of other measures seems more rational and efficient for the whole system than the unlimited improvement of the effectiveness of only one measure.

  6. Reve{a,i}ling the risks: a phenomenology of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    2010-01-01

    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. This paper develops a phenomenological account of information security, in which a

  7. Reve{a,i}ling the risks: a phenomenology of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    2009-01-01

    In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we

  8. [Protocols of health security in the light of some examples of risk management].

    Science.gov (United States)

    Postel-Vinay, Nicolas; Coquin, Yves

    2005-11-30

    Throughout medical training, medical risk management is a subject that has been insufficiently addressed and treated without a global vision. Yet the different dangers often make the front page of a media that addresses the question of health security when there is a failure of the system or new legal developments. Added to this disequilibrium of communication and training is the great complexity of risk management. Not only is the nature of the potentially dangerous agents extraordinarily varied but also the entity that detects the risk is sometimes a stranger to the causes of its appearance. The surrounding regulations are themselves complex and dense. Using the examples that have arisen over the last 2 or 3 years, this article describes the current French protocols in risk management, that rely upon the agencies delivering their expertise, certain of which are endowed with the power of policing these regulations. In practice, the doctor should understand the role of these agencies, know how to find the validated information that they can provide, and understand his role in this picture. A role that is perceived as far away as long as the risk has not emerged, but is in the forefront once the event arises.

  9. Risk Assessment Generated by Usage of ICT and Information Security Measures

    Directory of Open Access Journals (Sweden)

    Ilie TAMAS

    2006-01-01

    Full Text Available Information societies involve the usage of information technology and communications (ITC on a large scale. The dependence on ITC is an unquestionable problem in the present, because we assist to a generality of computers usage in all economic and social life activities. That is why organization information systems became accessible at the global level and there are permanently open for a quick exchange of information between different categories of users located by different geographical nods. The ITC usage involves the existing of some risks that should be known, evaluation and based on these, we must have information systems security measure. We consider that the risk is an indicator very important that must be permanently assess in the usage process of the information system based on ITC. Risk management suppose a permanently evaluation of these problems and also restrain by some practical actions who goes to the decrease of its effects. From the expose point of view, in this paper work it is presented the results of research based on specialty literature and current cases from practical activities, regarding the risks of ITC usage and their diminishing measure. There are distinguished the main factors (threat, vulnerability and impact who affect the information risk and on the other way, diminishing measure of the action to these factors for optimum working of an economic and social organism who use ITC. We consider that through proposed measures we assume safety in design process, implement and usage of the informational systems based on ITC.

  10. Scenario-neutral Food Security Risk Assessment: A livestock Heat Stress Case Study

    Science.gov (United States)

    Broman, D.; Rajagopalan, B.; Hopson, T. M.

    2015-12-01

    Food security risk assessments can provide decision-makers with actionable information to identify critical system limitations, and alternatives to mitigate the impacts of future conditions. The majority of current risk assessments have been scenario-led and results are limited by the scenarios - selected future states of the world's climate system and socioeconomic factors. A generic scenario-neutral framework for food security risk assessments is presented here that uses plausible states of the world without initially assigning likelihoods. Measures of system vulnerabilities are identified and system risk is assessed for these states. This framework has benefited greatly by research in the water and natural resource fields to adapt their planning to provide better risk assessments. To illustrate the utility of this framework we develop a case study using livestock heat stress risk within the pastoral system of West Africa. Heat stress can have a major impact not only on livestock owners, but on the greater food production system, decreasing livestock growth, milk production, and reproduction, and in severe cases, death. A heat stress index calculated from daily weather is used as a vulnerability measure and is computed from historic daily weather data at several locations in the study region. To generate plausible states, a stochastic weather generator is developed to generate synthetic weather sequences at each location, consistent with the seasonal climate. A spatial model of monthly and seasonal heat stress provide projections of current and future livestock heat stress measures across the study region, and can incorporate in seasonal climate and other external covariates. These models, when linked with empirical thresholds of heat stress risk for specific breeds offer decision-makers with actionable information for use in near-term warning systems as well as for future planning. Future assessment can indicate under which states livestock are at greatest risk

  11. Reducing Risk and Increasing Exploration Payoff with Symbiotic Rover Pairs

    Data.gov (United States)

    National Aeronautics and Space Administration — Planetary explorations missions avoid the destinations that offer the greatest scientific payout because these destinations come with a risk too great for a primary...

  12. Cyber-security: industrials must stop denying the risk of cyber-attacks

    International Nuclear Information System (INIS)

    Hausermann, L.

    2015-01-01

    The risk of cyber-attacks of industrial sites is real. Recently the Anvers port and the Bakou-Tbilissi-Ceyhan pipeline have been attacked. In both cases hackers succeeded: they were able to track sea containers in which drug was concealed and recover it in the Anvers port and in the case of the pipeline the hackers took control of the control system and were able to trigger a huge explosion by shunning security systems and allowing damaging pressure surges. The massive use of digital systems and of automated systems in various industrial sectors has led to huge network of inter-connected smart devices whose purpose is not to process data but to monitor and control. All these devices and equipment are controlled by software whose weaknesses and fault lines multiply the risk of cyber-attacks even for 'closed' networks. While the total hacking of a nuclear power plant is highly unlikely, real threats exist and must be taken into account. Innovative solutions based on the mapping of the fluxes of the system and combined with an inventory of all its weaknesses may pave the way towards cyber-security. (A.C.)

  13. Gait alterations can reduce the risk of edge loading.

    Science.gov (United States)

    Wesseling, Mariska; Meyer, Christophe; De Groote, Friedl; Corten, Kristoff; Simon, Jean-Pierre; Desloovere, Kaat; Jonkers, Ilse

    2016-06-01

    Following metal-on-metal hip arthroplasty, edge loading (i.e., loading near the edge of a prosthesis cup) can increase wear and lead to early revision. The position and coverage angle of the prosthesis cup influence the risk of edge loading. This study investigates the effect of altered gait patterns, more specific hip, and pelvis kinematics, on the orientation of hip contact force and the consequent risk of antero-superior edge loading using muscle driven simulations of gait. With a cup orientation of 25° anteversion and 50° inclination and a coverage angle of 168°, many gait patterns presented risk of edge loading. Specifically at terminal double support, 189 out of 405 gait patterns indicated a risk of edge loading. At this time instant, the high hip contact forces and the proximity of the hip contact force to the edge of the cup indicated the likelihood of the occurrence of edge loading. Although the cup position contributed most to edge loading, altering kinematics considerably influenced the risk of edge loading. Increased hip abduction, resulting in decreasing hip contact force magnitude, and decreased hip extension, resulting in decreased risk on edge loading, are gait strategies that could prevent edge loading. © 2015 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 34:1069-1076, 2016. © 2015 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  14. Improving performance of HVAC systems to reduce exposure to aerosolized infectious agents in buildings; recommendations to reduce risks posed by biological attacks.

    Science.gov (United States)

    Hitchcock, Penny J; Mair, Michael; Inglesby, Thomas V; Gross, Jonathan; Henderson, D A; O'Toole, Tara; Ahern-Seronde, Joa; Bahnfleth, William P; Brennan, Terry; Burroughs, H E Barney; Davidson, Cliff; Delp, William; Ensor, David S; Gomory, Ralph; Olsiewski, Paula; Samet, Jonathan M; Smith, William M; Streifel, Andrew J; White, Ronald H; Woods, James E

    2006-01-01

    The prospect of biological attacks is a growing strategic threat. Covert aerosol attacks inside a building are of particular concern. In the summer of 2005, the Center for Biosecurity of the University of Pittsburgh Medical Center convened a Working Group to determine what steps could be taken to reduce the risk of exposure of building occupants after an aerosol release of a biological weapon. The Working Group was composed of subject matter experts in air filtration, building ventilation and pressurization, air conditioning and air distribution, biosecurity, building design and operation, building decontamination and restoration, economics, medicine, public health, and public policy. The group focused on functions of the heating, ventilation, and air conditioning systems in commercial or public buildings that could reduce the risk of exposure to deleterious aerosols following biological attacks. The Working Group's recommendations for building owners are based on the use of currently available, off-the-shelf technologies. These recommendations are modest in expense and could be implemented immediately. It is also the Working Group's judgment that the commitment and stewardship of a lead government agency is essential to secure the necessary financial and human resources and to plan and build a comprehensive, effective program to reduce exposure to aerosolized infectious agents in buildings.

  15. Reducing Postharvest Losses during Storage of Grain Crops to Strengthen Food Security in Developing Countries

    Directory of Open Access Journals (Sweden)

    Deepak Kumar

    2017-01-01

    Full Text Available While fulfilling the food demand of an increasing population remains a major global concern, more than one-third of food is lost or wasted in postharvest operations. Reducing the postharvest losses, especially in developing countries, could be a sustainable solution to increase food availability, reduce pressure on natural resources, eliminate hunger and improve farmers’ livelihoods. Cereal grains are the basis of staple food in most of the developing nations, and account for the maximum postharvest losses on a calorific basis among all agricultural commodities. As much as 50%–60% cereal grains can be lost during the storage stage due only to the lack of technical inefficiency. Use of scientific storage methods can reduce these losses to as low as 1%–2%. This paper provides a comprehensive literature review of the grain postharvest losses in developing countries, the status and causes of storage losses and discusses the technological interventions to reduce these losses. The basics of hermetic storage, various technology options, and their effectiveness on several crops in different localities are discussed in detail.

  16. The persuasion and security awareness experiment: reducing the success of social engineering attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    Objectives: The aim of the current study is to explore to what extent an intervention reduces the effects of social engineering (e.g. the obtaining of access by persuasion) in an office environment. In particular, we study the effect of authority during a `social engineering' attack. Methods: 31

  17. Reducing Postharvest Losses during Storage of Grain Crops to Strengthen Food Security in Developing Countries.

    Science.gov (United States)

    Kumar, Deepak; Kalita, Prasanta

    2017-01-15

    While fulfilling the food demand of an increasing population remains a major global concern, more than one-third of food is lost or wasted in postharvest operations. Reducing the postharvest losses, especially in developing countries, could be a sustainable solution to increase food availability, reduce pressure on natural resources, eliminate hunger and improve farmers' livelihoods. Cereal grains are the basis of staple food in most of the developing nations, and account for the maximum postharvest losses on a calorific basis among all agricultural commodities. As much as 50%-60% cereal grains can be lost during the storage stage due only to the lack of technical inefficiency. Use of scientific storage methods can reduce these losses to as low as 1%-2%. This paper provides a comprehensive literature review of the grain postharvest losses in developing countries, the status and causes of storage losses and discusses the technological interventions to reduce these losses. The basics of hermetic storage, various technology options, and their effectiveness on several crops in different localities are discussed in detail.

  18. 78 FR 48029 - Improving Chemical Facility Safety and Security

    Science.gov (United States)

    2013-08-07

    ... Improving Chemical Facility Safety and Security By the authority vested in me as President by the... at reducing the safety risks and security risks associated with hazardous chemicals. However... to further improve chemical facility safety and security in coordination with owners and operators...

  19. Reducing the risk of baby falls in maternity units.

    Science.gov (United States)

    Janiszewski, Helen

    During a 12-month period there were 17 baby falls on the maternity wards at Nottingham University Hospitals Trust; two of the babies who fell were injured. By collecting information about the baby falls and how they happened, we were able to compile a guideline for both preventing and managing baby falls. This formed part of the trust's patient safety programme. We then piloted and implemented risk-prevention strategies for baby falls. These involved a risk assessment to identify women needing closer observation and the installation of bedside cots. These strategies brought about a marked reduction of baby falls and are now being established across all the maternity units across the trust.

  20. Aerobic exercise reduces biomarkers related to cardiovascular risk among cleaners

    DEFF Research Database (Denmark)

    Korshøj, Mette; Ravn, Marie Højbjerg; Holtermann, Andreas

    2016-01-01

    PURPOSE: Blue-collar workers have an increased risk of cardiovascular disease. Accordingly, elevated levels of biomarkers related to risk of cardiovascular disease, such as high-sensitive C-reactive protein, have been observed among blue-collar workers. The objective was to examine whether...... an aerobic exercise worksite intervention changes the level of inflammation biomarkers among cleaners. METHODS: The design was a cluster-randomized controlled trial with 4-month worksite intervention. Before the 116 cleaners aged 18-65 years were randomized, they signed an informed consent form...

  1. A Review and Comparative Analysis of Security Risks and Safety Measures of Mobile Health Apps

    Directory of Open Access Journals (Sweden)

    Karen Scott

    2015-11-01

    Full Text Available In line with a patient-centred model of healthcare, Mobile Health applications (mhealth apps provide convenient and equitable access to health and well-being resources and programs that can enable consumers to monitor their health related problems, understand specific medical conditions and attain personal fitness goals. This increase in access and control comes with an increase in risk and responsibility to identify and manage the associated risks, such as the privacy and security of consumers’ personal and health information. Based on a review of the literature, this paper identifies a set of risk and safety features for evaluating mHealth apps and uses those features to conduct a comparative analysis of the 20 most popular mHealth apps. The comparative analysis reveals that current mHealth apps do pose a risk to consumers. To address the safety and privacy concerns, recommendations to consumers and app developers are offered together with consideration of mHealth app future trends.

  2. The metabolic syndrome: targeting dyslipidaemia to reduce coronary risk.

    NARCIS (Netherlands)

    Ginsberg, H.N.; Stalenhoef, A.F.H.

    2003-01-01

    The metabolic syndrome is a complex constellation of disorders, each one a significant risk factor for the development of cardiovascular disease (CVD). The increasing prevalence of this condition is a major concern for healthcare providers both in Europe and North America. The concern surrounding

  3. Reducing the risk of cardiovascular disease in older women | Davey ...

    African Journals Online (AJOL)

    Cardiovascular disease (CVD) is the leading cause of death in women older than 50 years. Risk factors for CVD differ in some aspects from those in men. The prevention of CVD in women has undergone a reappraisal with the publication of studies looking at the use of menopausal hormone therapy for both primary and ...

  4. Green nanotech can reduce risks to poor nations

    Science.gov (United States)

    There have been major breakthroughs in nanomaterials for use in healthcare situations and some of these have already moved beyond the laboratory into the 'real world'. Now we need to pay serious attention to their potential risk to health and to the environment, both of which are...

  5. Reduce Fraud Risk in Your District with Stronger Internal Controls

    Science.gov (United States)

    Okrzesik, Daryl J.; Nuehring, Bert G.

    2011-01-01

    Internal accounts offer schools a faster, more convenient way to handle the income and expenses that result from student fees, school clubs and organizations, field trips, fund-raising, and similar activities. But this convenience also incurs the added risk of fraud. Fortunately, there are proven ways to strengthen internal controls and reduce…

  6. Reducing the Risk of Postoperative Genital Complications in Male Adolescents

    Science.gov (United States)

    Dossanova, ?ssem; Lozovoy, Vasiliy; Wood, Dan; ??nekenova, ?enzhekyz; Botabayeva, ?igul; Dossanov, Bolatbek; Lozovaya, Yelena; ?marov, ?algat

    2016-01-01

    The reproductive system of adolescents is exposed to a high risk of anomalies. In spite of the successes of surgical correction, the percentage of postoperative complications remains high. Special attention should be paid to circumcision, which is regarded as a religious tradition in many countries and carried out with sanitary violations. This…

  7. Study Shows Aspirin Reduces Colorectal Cancer in Those at High Risk

    Science.gov (United States)

    Findings from the first large clinical trial of its kind indicate that taking high doses of aspirin daily for at least 2 years substantially reduces the risk of colorectal cancer among people at increased risk of the disease.

  8. Setting priorities for reducing risk and advancing patient safety.

    Science.gov (United States)

    Gaffey, Ann D

    2016-04-01

    We set priorities every day in both our personal and professional lives. Some decisions are easy, while others require much more thought, participation, and resources. The difficult or less appealing priorities may not be popular, may receive push-back, and may be resource intensive. Whether personal or professional, the urgency that accompanies true priorities becomes a driving force. It is that urgency to ensure our patients' safety that brings many of us to work each day. This is not easy work. It requires us to be knowledgeable about the enterprise we are working in and to have the professional skills and competence to facilitate setting the priorities that allow our organizations to minimize risk and maximize value. © 2016 American Society for Healthcare Risk Management of the American Hospital Association.

  9. Does a vegan diet reduce risk for Parkinson's disease?

    Science.gov (United States)

    McCarty, M F

    2001-09-01

    Three recent case-control studies conclude that diets high in animal fat or cholesterol are associated with a substantial increase in risk for Parkinson's disease (PD); in contrast, fat of plant origin does not appear to increase risk. Whereas reported age-adjusted prevalence rates of PD tend to be relatively uniform throughout Europe and the Americas, sub-Saharan black Africans, rural Chinese, and Japanese, groups whose diets tend to be vegan or quasi-vegan, appear to enjoy substantially lower rates. Since current PD prevalence in African-Americans is little different from that in whites, environmental factors are likely to be responsible for the low PD risk in black Africans. In aggregate, these findings suggest that vegan diets may be notably protective with respect to PD. However, they offer no insight into whether saturated fat, compounds associated with animal fat, animal protein, or the integrated impact of the components of animal products mediates the risk associated with animal fat consumption. Caloric restriction has recently been shown to protect the central dopaminergic neurons of mice from neurotoxins, at least in part by induction of heat-shock proteins; conceivably, the protection afforded by vegan diets reflects a similar mechanism. The possibility that vegan diets could be therapeutically beneficial in PD, by slowing the loss of surviving dopaminergic neurons, thus retarding progression of the syndrome, may merit examination. Vegan diets could also be helpful to PD patients by promoting vascular health and aiding blood-brain barrier transport of L-dopa. Copyright 2001 Harcourt Publishers Ltd.

  10. Educational strategies to reduce risk: a choice of social responsibility

    Directory of Open Access Journals (Sweden)

    Federica La Longa

    2012-07-01

    Full Text Available This study develops the critical reflections of the activities for information, training and education that have been conducted by a group of researchers of the Istituto Nazionale di Geofisica e Vulcanologia in recent years. In particular, from an epistemological point of view, our analysis involves: (i science outreach, the link between science and the world; (ii science teaching and its role in the contact between science and schools; and (iii risk education, seen as a process that can develop a culture of risk in relation to the territory in which we live. These issues are critically analyzed on the basis of experience gained since 1995. The educational methodologies tested in ‘peacetime’ (in the absence of seismic events with the EDURISK Project are compared with those experienced during an emergency in Abruzzo, Italy. Today, we increasingly refer to prevention as the primary strategy of defense against risk. However, very often the responsibility of prevention falls on others, such as the government, institutions and/or local authorities. The citizens then perceive themselves as powerless against the inevitability of natural events, and they refer to these ‘rulers’ for the implementation of effective prevention policies. So, as researchers, what are the most effective actions we can take to influence risk reduction and to motivate the choices of the people? Must the effectiveness of our interventions be based on scientific information or on specific training, or must it be reached through the development of values, actions and awareness? Must our interventions be oriented and developed to inform, to train or to educate?

  11. Does retirement reduce the risk of mental disorders?

    DEFF Research Database (Denmark)

    Olesen, Kasper; Rod, Naja Hulvej; Madsen, Ida E.H.

    2015-01-01

    by reduced prevalence of hospital treatment for depression and antidepressant purchase. METHODS: Participants were 245 082 Danish workers who retired between 2000 and 2006. Information on retirement, hospital treatment and antidepressant purchases were obtained from Danish national registers. The yearly...

  12. Reducing HIV Risk in Botswana: A National Cluster Randomized ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    While HIV/AIDS has affected most regions in the world, sub-Saharan Africa has felt its impact most severely, both in terms of lives lost and the economic and social ... focused on the structural causes of HIV, such as poverty, poor education, and gender violence, can substantially reduce HIV infection among young women.

  13. Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Directory of Open Access Journals (Sweden)

    Audrey Guinchard

    2011-01-01

    Full Text Available Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war.

  14. THE FOOD RUSH. A SECURITY RISK AND A CAUSE FOR INTERNATIONAL INTERVENTION

    Directory of Open Access Journals (Sweden)

    Liliana FILIP

    2017-04-01

    Full Text Available Access to food is more than ever a question of interest. The world needs to produce at least 50% more food to feed 9 billion people by 2050. The land, biodiversity, oceans, forests, and other forms of natural capital are being depleted at unprecedented rates. Unless we change how we grow our food and manage our natural capital, food security – especially for the world’s poorest – will be at risk. In this context we expect that the struggle for food to generate migration, conflicts and, why not, international intervention defined by the new Copenhagen School of Security Studies paradigm. Since March 2008 governments, UN agencies and many social movements have adopted positions on the causes of the food crisis and the means to address it. Unfortunately, while these parties are trying to coordinate their activities and suggest new approaches, the old recipes for producing more food are often brought up. Contradictory proposals are made and the thought given to the causes underlying hunger and the food crisis (social, economic and political discrimination and exclusion has gone largely unheeded. The first Millennium Development Goal, which called for cutting the percentage of hungry people by half by 2015, is clearly out of reach. But the food crisis might lead to a new world food order.

  15. Satellite Data and Machine Learning for Weather Risk Management and Food Security.

    Science.gov (United States)

    Biffis, Enrico; Chavez, Erik

    2017-08-01

    The increase in frequency and severity of extreme weather events poses challenges for the agricultural sector in developing economies and for food security globally. In this article, we demonstrate how machine learning can be used to mine satellite data and identify pixel-level optimal weather indices that can be used to inform the design of risk transfers and the quantification of the benefits of resilient production technology adoption. We implement the model to study maize production in Mozambique, and show how the approach can be used to produce countrywide risk profiles resulting from the aggregation of local, heterogeneous exposures to rainfall precipitation and excess temperature. We then develop a framework to quantify the economic gains from technology adoption by using insurance costs as the relevant metric, where insurance is broadly understood as the transfer of weather-driven crop losses to a dedicated facility. We consider the case of irrigation in detail, estimating a reduction in insurance costs of at least 30%, which is robust to different configurations of the model. The approach offers a robust framework to understand the costs versus benefits of investment in irrigation infrastructure, but could clearly be used to explore in detail the benefits of more advanced input packages, allowing, for example, for different crop varieties, sowing dates, or fertilizers. © 2017 Society for Risk Analysis.

  16. Mandatory Risk Assessment Reduces Venous Thromboembolism in Bariatric Surgery Patients.

    Science.gov (United States)

    Nimeri, Abdelrahman A; Bautista, Jejomar; Ibrahim, Maha; Philip, Ruby; Al Shaban, Talat; Maasher, Ahmed; Altinoz, Ajda

    2018-02-01

    Bariatric surgery patients are at high risk for venous thromboembolism (VTE), and chemoprophylaxis is recommended. Sheikh Khalifa Medical City (SKMC) is an American College of Surgeons National Surgical Quality Improvement Program (ACS NSQIP) member since 2009. We report the rates of VTE in bariatric surgery patients from 2010 to 2016 compared to ACS NSQIP bariatric surgery programs before and after switching from heparin to low molecular weight heparin (LMWH), initiating mandatory risk assessment using Caprini scoring for VTE and adopting an aggressive strategy for high-risk patients regarding dosage of LMWH and chemoprophylaxis after discharge. During the study period, there were 1152 cases (laparoscopic Roux-en-Y gastric bypass (LRYGB) 625 and laparoscopic sleeve gastrectomy (LSG) 527) at Bariatric & Metabolic Institute (BMI) Abu Dhabi compared to 65,693 cases (LRYGB 32,130 and LSG 33,563) at ACS NSQIP bariatric surgery programs. VTE rates remained stable at ACS NSQIP bariatric surgery programs from 2010 to 2016 (0.45, 0.45, 0.45, 0.25, 0.35, 0.3, and 0.3%). In contrast, VTE rates at BMI Abu Dhabi decreased from 2.2% in 2011 to 0.35% after we adopted an aggressive strategy to VTE without an increase in bleeding complications. LRYGB patients with VTE had higher OR time, leak, collection, and mortality at ACS NSQIP hospitals compared to those at BMI Abu Dhabi. In contrast, rates were similar in LSG patients with VTE. Changing our approach to VTE management led our VTE rates to decrease and become like those of ACS NSQIP bariatric surgery patients in LSG and LRYGB.

  17. Hygienic food to reduce pathogen risk to bumblebees

    International Nuclear Information System (INIS)

    Graystock, P.; Jones, J.C.; Pamminger, T.; Parkinson, J.F.; Norman, V.; Blane, E.J.; Goulsona, D.; Hughesa, W.O.H.; Rothstein, L.; Wäckers, F.

    2016-01-01

    Bumblebees are ecologically and economically important pollinators, and the value of bumblebees for crop pollination has led to the commercial production and exportation/ importation of colonies on a global scale. Commercially produced bumblebee colonies can carry with them infectious parasites, which can both reduce the health of the colonies and spillover to wild bees, with potentially serious consequences. The presence of parasites in commercially produced bumblebee colonies is in part because colonies are reared on pollen collected from honey bees, which often contains a diversity of microbial parasites. In response to this threat, part of the industry has started to irradiate pollen used for bumblebee rearing. However, to date there is limited data published on the efficacy of this treatment. Here we examine the effect of gamma irradiation and an experimental ozone treatment on the presence and viability of parasites in honey bee pollen. While untreated pollen contained numerous viable parasites, we find that gamma irradiation reduced the viability of parasites in pollen, but did not eliminate parasites entirely. Ozone treatment appeared to be less effective than gamma irradiation, while an artificial pollen substitute was, as expected, entirely free of parasites. The results suggest that the irradiation of pollen before using it to rear bumblebee colonies is a sensible method which will help reduce the incidence of parasite infections in commercially produced bumblebee colonies, but that further optimisation, or the use of a nutritionally equivalent artificial pollen substitute, may be needed to fully eliminate this route of disease entry into factories. (author)

  18. Integrated firewood production, ensures fuel security for self sustaining Biomass Power Plants reduces agricultural cost and provides livestock production

    International Nuclear Information System (INIS)

    Lim, Andre

    2010-01-01

    Growing concerns on the impact of climate change, constraints on fossil fuel electricity generation and the likelihood of oil depletion is driving unprecedented growth and investment in renewable energy across the world. The consistency of biomass power plants makes them capable of replacing coal and nuclear for base-load. However experience had shown otherwise, climate change reduces yields, uncontrolled approvals for biomass boilers increased demands and at times motivated by greedy farmers have raised price of otherwise a problematic agricultural waste to high secondary income stream forcing disruption to fuel supply to power plants and even their shutting down. The solution is to established secured fuel sources, fortunately in Asia there are several species of trees that are fast growing and have sufficient yields to make their harvesting economically viable for power production. (author)

  19. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education.

    Science.gov (United States)

    Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K

    2013-08-09

    Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality

  20. Environmental biotechnology: Reducing risks from environmental chemicals through biotechnology

    International Nuclear Information System (INIS)

    Omenn, G.S.

    1988-01-01

    This book contains 34 papers on various aspects of hazardous waste management through biotechnology. The articles stress the three basic strategies of waste management; minimize the amount of waste generated; reduce the toxicity of the wastes; and find more satisfactory ways of disposing of wastes. Part I of this collection describes the use of microbial ecology, molecular biology, and other scientific disciplines to combat these problems. Part II describes the application of present technology to current problems. Part III describes the effect of policy and regulations on biotechnology. Individual papers are processed separately for the data base

  1. Acid-reducing vagotomy is associated with reduced risk of subsequent ischemic heart disease in complicated peptic ulcer

    Science.gov (United States)

    Wu, Shih-Chi; Fang, Chu-Wen; Chen, William Tzu-Liang; Muo, Chih-Hsin

    2016-01-01

    Abstract Persistent exacerbation of a peptic ulcer may lead to a complicated peptic ulcer (perforation or/and bleeding). The management of complicated peptic ulcers has shifted from acid-reducing vagotomy, drainage, and gastrectomy to simple local suture or non-operative (endoscopic/angiographic) hemostasis. We were interested in the long-term effects of this trend change. In this study, complicated peptic ulcer patients who received acid-reducing vagotomy were compared with those who received simple suture/hemostasis to determine the risk of ischemic heart disease (IHD). This retrospective cohort study analyzed 335,680 peptic ulcer patients recorded from 2000 to 2006 versus 335,680 age-, sex-, comorbidity-, and index-year matched comparisons. Patients with Helicobacter pylori (HP) infection were excluded. In order to identify the effect of vagus nerve severance, patients who received gastrectomy or antrectomy were also excluded. The incidence of IHD in both cohorts, and in the complicated peptic ulcer patients who received acid-reducing vagotomy versus those who received simple suture or hemostasis was evaluated. The overall incidence of IHD was higher in patients with peptic ulcer than those without peptic ulcer (17.00 vs 12.06 per 1000 person-years), with an adjusted hazard ratio (aHR) of 1.46 based on multivariable Cox proportional hazards regression analysis controlling for age, sex, Charlson's comorbidity index, and death (competing risk). While comparing peptic ulcer patients with acid-reducing vagotomy to those with simple suture/hemostasis or those without surgical treatment, the aHR (0.58) was the lowest in the acid-reducing vagotomy group. Patients with peptic ulcer have an elevated risk of IHD. However, complicated peptic ulcer patients who received acid-reducing vagotomy were associated with reduced risk of developing IHD. PMID:27977613

  2. Reducing the risk to Mars: The gas core nuclear rocket

    International Nuclear Information System (INIS)

    Howe, S.D.; DeVolder, B.; Thode, L.; Zerkle, D.

    1998-01-01

    The next giant leap for mankind will be the human exploration of Mars. Almost certainly within the next thirty years, a human crew will brave the isolation, the radiation, and the lack of gravity to walk on and explore the Red planet. However, because the mission distances and duration will be hundreds of times greater than the lunar missions, a human crew will face much greater obstacles and a higher risk than those experienced during the Apollo program. A single solution to many of these obstacles is to dramatically decrease the mission duration by developing a high performance propulsion system. The gas-core nuclear rocket (GCNR) has the potential to be such a system. The authors have completed a comparative study of the potential impact that a GCNR could have on a manned Mars mission. The total IMLEO, transit times, and accumulated radiation dose to the crew will be compared with the NASA Design Reference Missions

  3. Reducing acquisition risk through integrated systems of systems engineering

    Science.gov (United States)

    Gross, Andrew; Hobson, Brian; Bouwens, Christina

    2016-05-01

    In the fall of 2015, the Joint Staff J7 (JS J7) sponsored the Bold Quest (BQ) 15.2 event and conducted planning and coordination to combine this event into a joint event with the Army Warfighting Assessment (AWA) 16.1 sponsored by the U.S. Army. This multipurpose event combined a Joint/Coalition exercise (JS J7) with components of testing, training, and experimentation required by the Army. In support of Assistant Secretary of the Army for Acquisition, Logistics, and Technology (ASA(ALT)) System of Systems Engineering and Integration (SoSE&I), Always On-On Demand (AO-OD) used a system of systems (SoS) engineering approach to develop a live, virtual, constructive distributed environment (LVC-DE) to support risk mitigation utilizing this complex and challenging exercise environment for a system preparing to enter limited user test (LUT). AO-OD executed a requirements-based SoS engineering process starting with user needs and objectives from Army Integrated Air and Missile Defense (AIAMD), Patriot units, Coalition Intelligence, Surveillance and Reconnaissance (CISR), Focused End State 4 (FES4) Mission Command (MC) Interoperability with Unified Action Partners (UAP), and Mission Partner Environment (MPE) Integration and Training, Tactics and Procedures (TTP) assessment. The SoS engineering process decomposed the common operational, analytical, and technical requirements, while utilizing the Institute of Electrical and Electronics Engineers (IEEE) Distributed Simulation Engineering and Execution Process (DSEEP) to provide structured accountability for the integration and execution of the AO-OD LVC-DE. As a result of this process implementation, AO-OD successfully planned for, prepared, and executed a distributed simulation support environment that responsively satisfied user needs and objectives, demonstrating the viability of an LVC-DE environment to support multiple user objectives and support risk mitigation activities for systems in the acquisition process.

  4. Decommissioning Programme Management: reducing risk and cost while accelerating schedules through improved planning, Earned Value Management and safe work execution

    International Nuclear Information System (INIS)

    Hansen, S.E.

    2008-01-01

    CH2M HILL experience includes more than two decades of managing nuclear facilities and providing clean-up and operations support for commercial and government facilities worldwide. Our expertise ranges from decommissioning and defence sector businesses to nuclear technology development and innovation. Our approach places top priority on the safe execution of work while reducing both risk and cost. Our nuclear services include: programme management, nuclear safety analysis, radiological protection, radioactive waste management, nuclear remediation, nuclear materials and waste transportation management, nuclear safeguards and security services, and nuclear decontamination and decommissioning. This paper will discuss our approach which has resulted in a strong track record of accelerating schedules and reducing costs of major nuclear programmes, including Rocky Flats, Idaho, and our work at UKAEA sites. (author)

  5. Interventions for reducing extinction risk in chytridiomycosis-threatened amphibians.

    Science.gov (United States)

    Scheele, Ben C; Hunter, David A; Grogan, Laura F; Berger, Lee; Kolby, Jon E; McFadden, Michael S; Marantelli, Gerry; Skerratt, Lee F; Driscoll, Don A

    2014-10-01

    Wildlife diseases pose an increasing threat to biodiversity and are a major management challenge. A striking example of this threat is the emergence of chytridiomycosis. Despite diagnosis of chytridiomycosis as an important driver of global amphibian declines 15 years ago, researchers have yet to devise effective large-scale management responses other than biosecurity measures to mitigate disease spread and the establishment of disease-free captive assurance colonies prior to or during disease outbreaks. We examined the development of management actions that can be implemented after an epidemic in surviving populations. We developed a conceptual framework with clear interventions to guide experimental management and applied research so that further extinctions of amphibian species threatened by chytridiomycosis might be prevented. Within our framework, there are 2 management approaches: reducing Batrachochytrium dendrobatidis (the fungus that causes chytridiomycosis) in the environment or on amphibians and increasing the capacity of populations to persist despite increased mortality from disease. The latter approach emphasizes that mitigation does not necessarily need to focus on reducing disease-associated mortality. We propose promising management actions that can be implemented and tested based on current knowledge and that include habitat manipulation, antifungal treatments, animal translocation, bioaugmentation, head starting, and selection for resistance. Case studies where these strategies are being implemented will demonstrate their potential to save critically endangered species. © 2014 Society for Conservation Biology.

  6. Electrical markets, energy security and technology diversification: nuclear as cover against gas and carbon price risks?

    International Nuclear Information System (INIS)

    Roques, F.A.; Newbery, D.M.; Nuttall, W.J.; Neufville, R. de

    2005-01-01

    Recent tension in the oil and gas markets has brought back the concept of energy offer diversification. Electrical production technology diversification in a country helps improve the security of supply and make up for the negative effects of hydrocarbons price variations. The portfolio and real options theories help to quantify the optimum diversification level for a country or a power company. The cover value of a nuclear investment for a power company facing cost uncertainties (price of gas and of carbon dioxide emission permit) and proceeds (price of electricity) is assessed. A strong link between the prices of gas and electricity reduces incentives to private producers to diversify, disputing the capacity of a liberalized electrical market to achieve optimum technology diversity from a domestic point of view. (authors)

  7. Cereal fiber intake may reduce risk of gastric adenocarcinomas : The EPIC-EURGAST study

    NARCIS (Netherlands)

    Mendez, M. A.; Pera, Guillem; Aguclo, Antonio; Bueno-de-Mesquita, H. Bas; Palli, Domenico; Boeing, Heiner; Carneiro, Ftima; Berrino, Franco; Sacerdote, Carlotta; Tumino, Rosario; Panico, Salvatore; Berglund, Goeran; Manjer, Jonas; Johansson, Ingegerd; Stenling, Roger; Martinez, Carmen; Dorronsoro, Miren; Barricarte, Aurelio; Tormo, Maria J.; Quiros, Jose R.; Allen, Naomi; Key, Timothy J.; Bingham, Sheila; Linseisen, Jakob; Kaaks, Rudolf; Overvad, Kim; Jensen, Majken; Olsen, Anja; Tjonneland, Anne; Peeters, Petra H. M.; Numans, Mattijs E.; Ocke, Marga C.; Clavel-Chapelon, Francoise; Boutron-Ruault, Marie-Christine; Trichopoulou, Antonia; Lund, Eiliv; Slimani, Nadia; Jenab, Mazda; Ferrari, Pietro; Riboli, Elio; Gonzalez, Carlos A.

    2007-01-01

    Numerous case-control studies suggest dietary fiber may reduce risk of gastric cancer, but this has not been confirmed prospectively. A previous case-control study reported reduced risk of gastric cardia adenocarcinomas associated with cereal fiber, but not with fruit or vegetable fiber. To date,

  8. Security of attachment and quality of mother-toddler social interaction in a high-risk sample.

    Science.gov (United States)

    Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S

    2012-02-01

    The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.

  9. Risk-reducing mastectomy and salpingo-oophorectomy in unaffected BRCA mutation carriers: uptake and timing

    DEFF Research Database (Denmark)

    Skytte, A-B; Gerdes, Anne-Marie Axø; Andersen, M K

    2010-01-01

    from 306 healthy BRCA carriers with no personal history of ovarian or breast cancer. We found a 10-year uptake of 75% for risk-reducing salpingo-oophorectomy and 50% for risk-reducing mastectomy by time to event analysis. Age and childbirth influenced this decision. The uptake rate has not changed......Once female carriers of a BRCA mutation are identified they have to make decisions on risk management. The aim of this study is to outline the uptake of risk-reducing surgery in the Danish population of BRCA mutation positive women and to search for factors affecting this decision. We analysed data...

  10. Reducing environmental risks in water management in British Columbia

    International Nuclear Information System (INIS)

    Brownlow, H.

    1998-01-01

    The issue of water management regarding hydroelectric generating facilities in British Columbia was discussed. BC Hydro has adopted the following three processes to address water management risks: (1) the Electric System Operating Review, (2) Water Use Plans, and (3) an Environmental Management System. The greatest concern regarding water management are the potential impacts to fish and fish habitat. More than 90 per cent of BC Hydro's installed capacity is hydroelectric, with the balance produced by natural gas and diesel. All facilities are licensed under the provincial Water Act which has been in effect for the past century and is currently way out of date. Among its inadequacies is the fact that it does not provide for the protection of fish. The B.C. Fish Protection Act suggests that effective immediately, there should be no new dams on the Fraser and other significant rivers. BC Hydro facilities impact 16 of the 2,576 streams in British Columbia that support anadromous (migrating) salmon stocks. BC Hydro has 25 dams and diversions located on these 16 rivers. It was concluded that BC Hydro's impact on fish and fish habitat, although relatively small compared to the total fish resource in the province, is significant. The technology now used by BC Hydro is claimed to have the capacity to allow for easy documentation, rapid communication and the development of a comprehensive database for use in identifying and managing the impact of the Utility's operations on the fish population. 10 refs., 12 figs

  11. Going global - how to reduce the risks involved in exporting

    International Nuclear Information System (INIS)

    Mowers, J.

    1999-01-01

    Exporting oilfield expertise and technology overseas to new markets can be risky, a lesson that the company Fracmaster Ltd. learned the hard way when it lost investment in the former Soviet Union. The company's demise illustrates some of the risks inherent in conducting business in a foreign country. To be successful at this Canadian oilfield service and supply companies must not only know how to recognize opportunities but also to recognize the possible pitfalls and learn how to avoid them. Before looking at the export market, oil and gas service and supply companies should first ensure that they have not missed any opportunities at home. Canada is the second largest market in the world after the U.S. But companies should approach the American market with caution. The rule that companies should approach the U.S. first does not necessarily hold in the oil and gas industries. Mexico is another country where Canadian companies should use caution. The current hotspots in exporting are countries in the Middle East and the Latin American countries. Saudi Arabia is interested in technology and expertise. although political factors in Iran will have to improve before commitment to that market is advisable. Industry Canada has a wealth of information and services available to companies interested in exporting. There are a number of government programs to help companies finance efforts to enter the export market. Industry Canada also offers a capital projects bidding program for Canadian companies bidding on projects greater than $1 million

  12. How do women at increased breast cancer risk perceive and decide between risks of cancer and risk-reducing treatments? A synthesis of qualitative research.

    Science.gov (United States)

    Fielden, Hannah G; Brown, Stephen L; Saini, Pooja; Beesley, Helen; Salmon, Peter

    2017-09-01

    Risk-reducing procedures can be offered to people at increased cancer risk, but many procedures can have iatrogenic effects. People therefore need to weigh risks associated with both cancer and the risk-reduction procedure in their decisions. By reviewing relevant literature on breast cancer (BC) risk reduction, we aimed to understand how women at relatively high risk of BC perceive their risk and how their risk perceptions influence their decisions about risk reduction. Synthesis of 15 qualitative studies obtained from systematic searches of SCOPUS, Web of Knowledge, PsychINFO, and Medline electronic databases (inception-June 2015). Women did not think about risk probabilistically. Instead, they allocated themselves to broad risk categories, typically influenced by their own or familial experiences of BC. In deciding about risk-reduction procedures, some women reported weighing the risks and benefits, but papers did not describe how they did so. For many women, however, an overriding wish to reduce intense worry about BC led them to choose aggressive risk-reducing procedures without such deliberation. Reasoning that categorisation is a fundamental aspect of risk perception, we argue that patients can be encouraged to develop more nuanced and accurate categorisations of their own risk through their interactions with clinicians. Empirically-based ethical reflection is required to determine whether and when it is appropriate to provide risk-reduction procedures to alleviate worry. © 2016 The Authors. Psycho-Oncology Published by John Wiley & Sons Ltd.

  13. Men without a sense of smell exhibit a strongly reduced number of sexual relationships, women exhibit reduced partnership security - a reanalysis of previously published data.

    Science.gov (United States)

    Croy, Ilona; Bojanowski, Viola; Hummel, Thomas

    2013-02-01

    Olfactory function influences social behavior. For instance, olfaction seems to play a key role in mate choice and helps detecting emotions in other people. In a previous study, we showed that people who were born without a sense of smell exhibit enhanced social insecurity. Based on the comments to this article we decided to have a closer look to whether the absence of the sense of smell affects men and women differently. Under this focus questionnaire data of 32 patients, diagnosed with isolated congenital anosmia (10 men, 22 women) and 36 age-matched healthy controls (15 men, 21 women) was reanalyzed. In result, men and women without a sense of smell reported enhanced social insecurity, but with different consequences: Men who were born without a sense of smell exhibit a strongly reduced number of sexual relationships and women are affected such that they feel less secure about their partner. This emphasizes the importance of the sense of smell for intimate relationships. Copyright © 2012 Elsevier B.V. All rights reserved.

  14. Review of depopulation of the border villages in the context of national security risk

    Directory of Open Access Journals (Sweden)

    Vukmirović Jovanka A.

    2016-01-01

    Full Text Available According to internationally comparable statistical indicators, Serbia is among the countries with the highest development disparities (regional and local, both among Balkan neighbors and European scale. Large differences in development occur during the second half of the last century, a period culminating in the failed socio-economic transition of the millennium. Devastation and depopulation are causal phenomena, the population rapidly leaving impoverished areas and gravitate to the larger centers. Conditionally speaking, the more developed cities continue to develop while poor towns and villages are still poor. Proverb says, 'Whose sheep, that and the mountains. ' Emptying the territory highly correlated with an increase in surface area of agricultural land uncultivated, thus permanently extinguished agriculture as the main activity and main source of income in rural areas. Emptying the territory is the biggest development problem in Serbia, but also represents one of the biggest national security risks. Increasingly, the question whether Serbia will in the future be able to keep the territory in which he remains without population and whether the threshold bezbednostnog risk isšražnjene administration of the territory in the border areas. This paper presents a statistical description of census data in 1971, 1981, 1991, 2002 and 2011 as well as the analysis of demographic trends in border settlements for the considered period. The paper also proposed a set of measures and recommendations for overcoming depopulation, in accordance with available resources and the natural limits of border settlements.

  15. Understanding and reducing the risk of supply chain disruptions.

    Science.gov (United States)

    Clark, Graham

    2012-01-01

    Natural disasters can wreck havoc on business operations. When civil unrest swept the UK in August 2011, the effect on business was stark, losing the retail sector £300m in unexpected costs and lost revenues. On the other side of the world, the natural disaster that hit Japan in early 2011 is estimated to have run up costs in the region of £189bn in repairs. Beyond this, the earthquake and its aftermath shattered supply chains, with technology companies expecting delays of up to six months before business could resume fully. It is impossible to predict incidents like these, but businesses can help mitigate disruption in the supply chain by undertaking business continuity management (BCM). A flexible supply chain is essential when it comes to BCM - whether it means being able to cope with altering transport routes at short notice, or finding or replacing a supplier at the last minute. Understanding the supply chain is critical when responding to major impacts that affect supply chains in multiple points - like IT system failures and country-wide fuel strikes. Businesses should carry out detailed business impact assessments and risk assessments right across the end-to-end supply chain and not just at key single points of failure. It is an intensive process that needs dedicated resources and ownership at the highest level. Recognising this, DHL has designed a 10-step process, which it has implemented across its global supply chain business. This paper provides an overview of what a supply chain really looks like, what can cause disruptions and how far up/down the supply chain companies need to go with their BCM planning.

  16. Dynamic model of minimax control over economic security state of the region in the presence of risks

    Directory of Open Access Journals (Sweden)

    Andrey Fedorovich Shorikov

    2012-06-01

    Full Text Available Investigation and solution of management of economic security state in the region (MESSR requires development of a dynamic economic-mathematical model that takes into account the presence of control actions, uncontrolled parameters (risk modeling errors, etc. and availability of information deficit. At the same time, the existing approaches to solving such problems are based primarily on static models and the use of stochastic modeling of the device, which is required for the application of knowledge of the probability characteristics of the main model parameters and special conditions for the realization of the process. We should note that to use the apparatus of stochastic modeling, very strict conditions are required, which in practice are usually not feasible in advance In this paper, we propose to use a deterministic approach for modeling and solving the original problem in the form of a dynamic programming problem of minimax control (optimization of a guaranteed result MESSR at the determined point of time, taking into account the availability of risks of deterministic and stochastic nature (combined risks model. At thesametime, under therisks in thesocial and economic system we understand thefactors that negatively catastrophically affect the results of the reviewed processes inside it. For an effective use, a technique of prediction and assessment of time rows and stochastic risks in MESSR optimization process is presented, which can serve as a basis for the development of appropriate computer software. To solve the problem of program minimax control MESSR in the presence of risks, we propose a method which is reduced to the realization of a finite number of solutions of linear and convex mathematical programming and discrete optimization problem. The proposed method makes it possible to develop efficient numerical procedures to implement computer simulation of the dynamics of the problem, build program minimax control and gain optimal

  17. Critical visualization: a case for rethinking how we visualize risk and security

    OpenAIRE

    Hall, Peter; Heath, Claude; Coles-Kemp, Lizzie

    2015-01-01

    In an era of high-profile hacks, information leaks and cybercrime, cybersecurity is the focus of much corporate and state-funded research. Data visualization is regarded as an important tool in the detection and prediction of risk and vulnerability in cybersecurity, but discussion tends to remain at the level of the usability of visualization tools and how to reduce the cognitive load on the consumers of the visualizations. This focus is rooted in a desire to simplify the complexity of cybers...

  18. Labor rights of employees of the private security providers in El Salvador, and their relation to psychosocial risk

    Directory of Open Access Journals (Sweden)

    Carlos Alberto Coca Muñoz

    2014-11-01

    Full Text Available This paper draws the attention of the academic community, businessmen, worker associations/unions, and public decision makers to the relation between preventing psychosocial risks for private security workers in El Salvador, and the respect for their worker rights as enshrined in the Constitution of the Republic, the Labor Code, and the General Law for the Prevention of Risk at the Workplace. It addresses the doctrine and legal framework of psychosocial risk, and government responsibility in terms of occupational security and health –specifically, the intervention of work inspections by the Ministry of Labor, and verifying psychosocial risks.DOI: http://dx.doi.org/10.5377/rpsp.v4i1.1557

  19. Stochastic Security and Risk-Constrained Scheduling for an Autonomous Microgrid with Demand Response and Renewable Energy Resources

    DEFF Research Database (Denmark)

    Vahedipour-Dahraie, Mostafa; Rashidizadeh-Kermani, Homa; Najafi, Hamid Reza

    2017-01-01

    is to determine the optimal scheduling with considering risk aversion and system frequency security to maximise the expected profit of operator. To deal with various uncertainties, a riskconstrained two-stage stochastic programming model is proposed where the risk aversion of MG operator is modelled using...... of customers can be effectively applied to balance the demand and supply in electricity networks. This study presents a novel stochastic model from a microgrid (MG) operator perspective for energy and reserve scheduling considering risk management strategy. It is assumed that the MG operator can procure energy...... conditional value at risk method. Extensive numerical results are shown to demonstrate the effectiveness of the proposed framework....

  20. Scientific Opportunities to Reduce Risk in Nuclear Process Science

    International Nuclear Information System (INIS)

    Bredt, Paul R.; Felmy, Andrew R.; Gauglitz, Phillip A.; Poloski, Adam P.; Vienna, John D.; Moyer, Bruce A.; Hobbs, David; Wilmarth, B.; Mcilwain, Michael; Subramanian, K.; Krahn, Steve; Machara, N.

    2009-01-01

    overall intent of this paper is to foster a dialogue on how basic scientific research can assist DOE in executing its cleanup and environmental management mission. In this paper, we propose that such scientific investments not be focused solely on what may be viewed as current DOE needs, but also be based upon longer-term investments in specific areas of science that underpin technologies presently in use. In the latter regard, we propose four science theme areas: (1) the structure and dynamics of materials and interfaces, (2) coupled chemical and physical processes, (3) complex solution phase phenomena, and (4) chemical recognition phenomena. The proposed scientific focus for each of these theme areas and the scientific opportunities are identified, along with links to major risks within the initiative areas identified in EM's Engineering and Technology Roadmap.

  1. Water security, risk and economic growth: lessons from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2016-04-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been a noteworthy feature in the development of most civilisations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple sectors of the economy, especially those that are water intensive such as agriculture and energy; and (ii) by reducing the acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate these risks in order to promote economic growth is widely acknowledged, but prior work to conceptualise the relationship between water-related risks and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical model of water-related investment, risk, and growth at the national level. The model suggests the existence of a context-specific threshold above which growth proceeds along an 'S'-curve. In many cases there is a requirement for initial investment in water-related assets to enable growth. Below the threshold it is possible for a poverty trap to arise. The presence and location of the poverty trap is context-specific and depends on the relative exposure of productive water-related assets to risk, compared with risks faced by assets in the wider economy. Exogenous changes in the level of water-related risk (through, for example, climate and land cover change) can potentially push an economy away from a growth path towards a poverty trap. These results illustrate the value of accounting for environmental risk in models of economic growth and may offer guidance in the design of robust policies for investment in water-related productive assets to manage risk, particularly in the face of global and regional environmental change.

  2. Critical Success Factors for an Effective Security Risk Management Program in an Organization: An Exploratory Case Study

    Science.gov (United States)

    Zafar, Humayun

    2010-01-01

    This study investigates differences in perception between layers of management (executive, middle, and lower) and staff with regard to the influence of critical success factors (CSFs) on security risk management (SRM) effectiveness. This is an in-depth case study conducted at a Fortune 500 company. Rockart's (1979) CSF method is modified through…

  3. Food Security and Cardiovascular Disease Risk Among Adults in the United States: Findings From the National Health and Nutrition Examination Survey, 2003–2008

    Science.gov (United States)

    2013-01-01

    Introduction Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. Methods A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003–2008 was conducted. Four levels of food security status were defined by using 10 questions. Results Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31–4.31). Conclusion Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk. PMID:24309090

  4. Food security and cardiovascular disease risk among adults in the United States: findings from the National Health and Nutrition Examination Survey, 2003-2008.

    Science.gov (United States)

    Ford, Earl S

    2013-12-05

    Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003-2008 was conducted. Four levels of food security status were defined by using 10 questions. Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31-4.31). Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk.

  5. Scientific Opportunities to Reduce Risk in Nuclear Process Science

    International Nuclear Information System (INIS)

    Bredt, P.R.; Felmy, A.R.; Gauglitz, P.A.; Poloski, A.P.; Vienna, J.D.; Moyer, B.A.; Hobbs, D.; Wilmarth, B.; McIlwain, M.; Subramanian, K.; Krahn, S.; Machara, N.

    2009-01-01

    intent of this paper is to foster a dialogue on how basic scientific research can assist DOE in executing its cleanup and environmental management mission. In this document, we propose that such scientific investments should not be focused solely on what may be viewed as current DOE needs, but also upon longer-term investments in specific areas of science that underpin technologies presently in use. In the latter regard, we propose four science theme areas: 1) the structure and dynamics of materials and interfaces, 2) coupled chemical and physical processes, 3) complex solution phase phenomena, and 4) chemical recognition phenomena. The proposed scientific focus for each of these theme areas and the scientific opportunities are identified, along with links to major risks within the initiative areas identified in EM's Engineering and Technology Road-map. The authors encourage feedback from our colleagues in the nuclear waste and related fields. (authors)

  6. Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance

    CERN Document Server

    Mather, Tim; Latif, Shahed

    2009-01-01

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn deta

  7. Cigarette smoking risk-reducing beliefs: Findings from the United States Health Information National Trends Survey.

    Science.gov (United States)

    Kaufman, Annette R; Coa, Kisha I; Nguyen, Anh B

    2017-09-01

    Cigarette smoking risk-reducing beliefs are ideas that certain health promoting behaviors (e.g., exercise) may mitigate the risks associated with smoking. The objective of this study was to describe smoking risk-reducing beliefs and the belief that quitting can reduce the harmful effects of smoking among the U.S. adult population and the associations between these beliefs, current smoking status, and sociodemographics. Data were from the Health Information National Trends Survey 4 (HINTS 4) Cycles 3 and 4 (2013-2014; N=6862). Descriptive analyses were conducted to examine bivariate associations among the quit smoking belief, smoking risk-reducing beliefs, and covariates. Weighted ordinal logistic regression models examined the adjusted associations between smoking status and sociodemographics, with quit smoking belief and risk-reducing beliefs. Eighty-two percent of the population reported that quitting cigarette smoking can help reduce the harmful effects of smoking a lot: former smokers and individuals with higher educational attainment were more likely to endorse this belief than never smokers and those with lower educational attainment. Many people endorsed smoking risk-reducing beliefs about exercise (79.3%), fruits and vegetables (71.8%), vitamins (67.2%), and sleep (68.5%). Former smokers were less likely to subscribe to these beliefs than never smokers. Vulnerable populations who may be most at risk of smoking attributable morbidity and mortality were more likely to endorse risk-reducing beliefs. Future studies are needed to better understand how risk-reducing beliefs are formed and if modifying these beliefs may help to reduce cigarette smoking in the U.S. Published by Elsevier Inc.

  8. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  9. Store Security: Reducing Shoplifting.

    Science.gov (United States)

    Minsel, Robert; Garman, Jerry

    The major purpose of the course outline presented in the document is the reduction of stealing in retail stores. The teaching outline is formatted by juxtaposing the content outline of each substantive area next to relevant activities and methods. Some of the topics covered are psychology of shoplifting, tools used by shoplifters, Ohio's law on…

  10. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  11. Comparison of human exposure pathways in an urban brownfield: reduced risk from paving roads.

    Science.gov (United States)

    James, Kyle; Farrell, Richard E; Siciliano, Steven D

    2012-10-01

    Risk assessments often do not quantify the risk associated with soil inhalation. This pathway generally makes a negligible contribution to the cumulative risk, because soil ingestion is typically the dominant exposure pathway. Conditions in northern or rural centers in Canada characterized by large areas of exposed soil, including unpaved roads, favor the resuspension of soil particles, making soil inhalation a relevant risk pathway. The authors determined and compared human exposure to metals and polycyclic aromatic hydrocarbons (PAHs) from soil ingestion and inhalation and analyzed the carcinogenic and noncarcinogenic risks before and after roads were paved in a northern community. To determine the inhalation exposure, three size fractions of airborne particulate matter were collected (total suspended particulates [TSP], particulate matter with an aerodynamic diameter less than 10 µm [PM10], and particulate matter with an aerodynamic diameter less than 2.5 µm [PM2.5]) before and after roads were paved. Road paving reduced the concentration of many airborne contaminants by 25 to 75%, thus reducing risk. For example, before paving, the carcinogenic risk associated with inhalation of Cr was 3.4 excess cancers per 100,000 people exposed, whereas after paving, this risk was reduced to 1.6 in 100,000. Paving roads reduced the concentrations of total suspended particulates (TSP; p roads is an effective method of reducing risk from the inhalation of soil particles. Copyright © 2012 SETAC.

  12. Perceptions of the risk of child abduction or loss and the utility of child electronic security devices.

    Science.gov (United States)

    Dixon, R M; Pasnak, R

    1997-09-01

    Perceptions of the susceptibility of young children to becoming lost or being abducted, and of the potential usefulness of child electronic security devices, were examined via a questionnaire. Data were provided by 41 volunteers, most of them from a local government office centre. The questionnaire asked for demographic data, and then for the risk of a child being abducted or lost when under the supervision of different caregivers and in different situations. The probable effectiveness of three common abductor ploys was also addressed. The questionnaire concluded with 10 questions about child electronic security devices. Respondents viewed mothers, fathers, and grandparents as equally responsible caregivers and young adults/babysitters as the least responsible. These effects diminished as the age of the children increased. The garden at home was judged to be the most secure environment for children of all ages, while an amusement park was judged the least secure environment. Children were perceived to be more at risk of an abduction when a stranger asked for physical assistance or to take them to the hospital because their parents were hurt, than when asked for directions. Furthermore, the respondents expressed a moderately strong need for child electronic security devices, and viewed parents who use them as more responsible than those who do not.

  13. But you should be the specialist! Weak Mental Rotation Performance in Aviation Security Screeners.Reduced performance level in aviation security with no gender effect.

    Directory of Open Access Journals (Sweden)

    Jenny Kathinka Krüger

    2016-03-01

    Full Text Available Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.

  14. You Should Be the Specialist! Weak Mental Rotation Performance in Aviation Security Screeners - Reduced Performance Level in Aviation Security with No Gender Effect.

    Science.gov (United States)

    Krüger, Jenny K; Suchan, Boris

    2016-01-01

    Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.

  15. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  16. Do biofuel blending mandates reduce gasoline consumption? Implications of state-level renewable fuel standards for energy security

    Science.gov (United States)

    Lim, Shinling

    In an effort to keep America's addiction to oil under control, federal and state governments have implemented a variety of policy measures including those that determine the composition of motor gasoline sold at the pump. Biofuel blending mandates known as Renewable Fuel Standards (RFS) are designed to reduce the amount of foreign crude oil needed to be imported as well as to boost the local ethanol and corn industry. Yet beyond looking at changes in gasoline prices associated with increased ethanol production, there have been no empirical studies that examine effects of state-level RFS implementation on gasoline consumption. I estimate a Generalized Least Squares model for the gasoline demand for the 1993 to 2010 period with state and time fixed effects controlling for RFS. States with active RFS are Minnesota, Hawaii, Missouri, Florida, Washington, and Oregon. I find that, despite the onset of federal biofuel mandates across states in 2007 and the lower energy content of blended gasoline, being in a state that has implemented RFS is associated with 1.5% decrease in gasoline consumption (including blended gasoline). This is encouraging evidence for efforts to lessen dependence on gasoline and has positive implications for energy security.

  17. Probabilistic risk assessment of earthquakes at the Rocky Flats Plant and subsequent upgrade to reduce risk

    International Nuclear Information System (INIS)

    Day, S.A.

    1989-01-01

    An analysis to determine the risk associated with earthquakes at the Rocky Flats Plant was performed. Seismic analyses and structural evaluations were used to postulate building and equipment damage and radiological releases to the environment from various magnitudes of earthquakes. Dispersion modeling and dose assessment to the public were then calculated. The frequency of occurrence of various magnitudes of earthquakes were determined from the Department of Energy natural Phenomena Hazards Modeling Project. Risk to the public was probabilistically assessed for each magnitude of earthquake and for overall seismic risk. Based on the results of this Probabilistic Risk Assessment and a cost/benefit analysis, seismic upgrades are being implemented for several plutonium-handling facilities for the purpose of risk reduction

  18. Civilian Joint Task Force’ (CJTF – A Community Security Option: A Comprehensive and Proactive Approach of Reducing Terrorism

    Directory of Open Access Journals (Sweden)

    Oluwaseun Bamidele

    2016-06-01

    Full Text Available Since the Boko Haram uprising in 2009, the Nigerian government has employed various strategies as counter-terrorism measures to stem the atrocities of the group. These strategies include amnesty negotiations, implementation of emergency law in the northeast, increase in security spending to the deployment of military force. In the midst of these security measures, the civilian Joint Task Force (JTF emerged, first as a community effort, and later as a joint effort with the security forces to help fight Boko Haram. The civilian JTF has helped recover towns and villages from Boko Haram, rescued women in the northeast and helped identify Boko Haram members shielded by some local people. Although doubts have been expressed in some quatres that the civilian JTF could transform into ethnic militias, the Boko Haram security threat neutralized by the group indicates an untapped security potential in Nigerian communities. However, one approach that has yet to be pursued is community security option. Community security option is a model built around proactive citizen-driven communal response. This article explains the role of civilian JTF and how civilian JTF can be used to investigate terrorism in Nigeria. This article will contribute to the discourse on the imperative of African-inspired mechanisms to solving African security problems.

  19. Risk management framework a lab-based approach to securing information systems

    CERN Document Server

    Broad, James

    2013-01-01

    The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly im

  20. Reducing the Risk of Tick-Borne Diseases through Smart, Safe and Sustainable Pest Control

    Science.gov (United States)

    Each year PestWise programs form new partnerships to address ongoing and emerging issues. Reducing the risk from ticks and tick-borne disease is an issue of importance and EPA is contributing to a larger federal effort.

  1. Cerebrospinal fluid leakage during transsphenoidal surgery: postoperative external lumbar drainage reduces the risk for meningitis

    NARCIS (Netherlands)

    van Aken, M. O.; Feelders, R. A.; de Marie, S.; van de Berge, J. H.; Dallenga, A. H. G.; Delwel, E. J.; Poublon, R. M. L.; Romijn, J. A.; van der Lely, A. J.; Lamberts, S. W. J.; de Herder, W. W.

    2004-01-01

    Postoperative meningitis is a well known complication of transsphenoidal surgery (TSS). The objective of this study was to evaluate whether postoperative external cerobrospinal fluid (CSF) drainage in case of intraoperative CSF-leakage, reduces the risk of postoperative meningitis. We

  2. Aspirin for Reducing Your Risk of Heart Attack and Stroke: Know the Facts

    Science.gov (United States)

    ... the-Counter Medicines Safe Daily Use of Aspirin Aspirin for Reducing Your Risk of Heart Attack and ... any pharmacy, grocery or convenience store and buy aspirin without a prescription. The Drug Facts label on ...

  3. Perioperative Statin Therapy Is Not Associated With Reduced Risk of Anastomotic Leakage After Colorectal Resection

    DEFF Research Database (Denmark)

    Bisgård, Anne Sofie; Noack, Morten Westergaard; Klein, Mads

    2013-01-01

    Anastomotic leakage is a serious complication of colorectal surgery. Several studies have demonstrated the beneficial pleiotropic effects of statins, and preliminary studies have suggested that perioperative statin treatment may be associated with reduced risk of anastomotic leakage....

  4. On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2015-01-01

    Full Text Available Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multilevel, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision-making process and conserve decision-maker’s time and attention. In the paper we utilized proposed multilevel analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML and evaluated its performance in terms of mentioned factors.

  5. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    Science.gov (United States)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  6. 21st Century Security Manager

    OpenAIRE

    Stelian ARION

    2010-01-01

    We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers ...

  7. Reducing the risk of Legionnaires' disease associated with cooling towers

    Energy Technology Data Exchange (ETDEWEB)

    Freije, M.R. [HC Information Resources Inc., Carlsbad, CA (United States)

    2008-08-15

    To reduce the health and legal risks associated with Legionnaires' disease, facility managers should take steps to minimize Legionella bacteria in plumbing systems, open industrial equipment, water features, cooling towers, and other aerosolizing water systems. The risk of Legionnaires' disease associated with cooling towers can be reduced by controlling Legionella bacteria in cooling water and preventing transmission of the bacteria from towers to people. This paper presents nine reasonable ways to accomplish these goals. (orig.)

  8. Immediate Antiretroviral Therapy Reduces Risk of Infection-Related Cancer During Early HIV Infection

    DEFF Research Database (Denmark)

    Borges, Alvaro Humberto Diniz; Neuhaus, Jacqueline; Babiker, Abdel G

    2016-01-01

    BACKGROUND:  In the Strategic Timing of Antiretroviral Treatment (START) study, immediate combination antiretroviral therapy (cART) initiation reduced cancer risk by 64%. We hypothesized that risk reduction was higher for infection-related cancer and determined by differences in CD4 cell counts a...

  9. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  10. 48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.

    Science.gov (United States)

    2010-10-01

    ... background inquiries pertaining to verification of name, physical description, marital status, present and... undergo security processing by the Department's Office of Security before being eligible to work on the.... citizens must have: (1) Official legal status in the United States; (2) Continuously resided in the United...

  11. Context dependency and consumer acceptance of risk reducing strategies - a choice experiment study on salmonella risks in pork

    DEFF Research Database (Denmark)

    Mørkbak, Morten Raun; Christensen, Tove; Gyrd-Hansen, Dorte

    2012-01-01

    The paper investigates to what extent context dependency is present, when consumers are introduced to different risk reducing technologies and how this will affect their preferences for reductions in food risks. In particular, choice experiments are used to elicit consumer preferences for reducin...... findings of bad news having greater effect than good news – now applied to context dependency of preferences for food safety technologies....

  12. Sustainable, alternative farming practices as a means to simultaneously secure food production and reduce air pollution in East Asia

    Science.gov (United States)

    Tai, A. P. K.; Fung, K. M.; Yong, T.; Liu, X.

    2015-12-01

    Proper agricultural land management is essential for securing food supply and minimizing damage to the environment. Among available farming practices, relay strip intercropping and fertilizer application are commonly used, but to study their wider environmental implications and possible feedbacks we require an Earth system modeling framework. In this study, the effectiveness of a maize-soybean relay strip intercropping system and fertilizer reduction is investigated using a multi-model method. The DNDC (DeNitrification-DeComposition) model is used to simulate agricultural activities and their impacts on the environment through nitrogen emissions and changes in soil chemical composition. Crop yield, soil nutrient content and nitrogen emissions to the atmosphere in major agricultural regions of China are predicted under various cultivation scenarios. The GEOS-Chem global chemical transport model is then used to estimate the effects on downwind particle and ozone air pollution. We show that relay strip intercropping and optimal fertilization not only improve crop productivity, but also retain soil nutrients, reduce ammonia emission and mitigate downwind air pollution. By cutting 25% fertilization inputs but cultivating maize and soybean together in a relay strip intercropping system used with field studies, total crop production was improved slightly by 4.4% compared to monoculture with conventional amount of fertilizers. NH3 volatilization decreases by 29%, equivalent to saving the pollution-induced health damage costs by about US$2.5 billion per year. The possible feedback effects from atmospheric nitrogen deposition onto the croplands are also investigated. We show that careful management and better quantitative understanding of alternative farming practices hold huge potential in simultaneously addressing different global change issues including the food crisis, air pollution and climate change, and calls for greater collaboration between scientists, farmers and

  13. Food Security and Cardiovascular Disease Risk Among Adults in the United States: Findings From the National Health and Nutrition Examination Survey, 2003?2008

    OpenAIRE

    Ford, Earl S.

    2013-01-01

    Introduction Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. Methods A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003?2008 was conducted. Fou...

  14. The efficiency of asset management strategies to reduce urban flood risk.

    Science.gov (United States)

    ten Veldhuis, J A E; Clemens, F H L R

    2011-01-01

    In this study, three asset management strategies were compared with respect to their efficiency to reduce flood risk. Data from call centres at two municipalities were used to quantify urban flood risks associated with three causes of urban flooding: gully pot blockage, sewer pipe blockage and sewer overloading. The efficiency of three flood reduction strategies was assessed based on their effect on the causes contributing to flood risk. The sensitivity of the results to uncertainty in the data source, citizens' calls, was analysed through incorporation of uncertainty ranges taken from customer complaint literature. Based on the available data it could be shown that increasing gully pot blockage is the most efficient action to reduce flood risk, given data uncertainty. If differences between cause incidences are large, as in the presented case study, call data are sufficient to decide how flood risk can be most efficiently reduced. According to the results of this analysis, enlargement of sewer pipes is not an efficient strategy to reduce flood risk, because flood risk associated with sewer overloading is small compared to other failure mechanisms.

  15. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    National Research Council Canada - National Science Library

    Gallagher, Jerry P

    2008-01-01

    Each day approximately 6,800 members of the private security workforce are deployed across Kansas City to provide protection services at venues, many of which have been identified as being critical...

  16. Reducing the Threat of Terrorism through Knowledge Sharing in a Virtual Environment Between Law Enforcement and the Private Security Industry

    National Research Council Canada - National Science Library

    Gallagher, Jerry P

    2008-01-01

    ... between private security and the KCPD. To empower this resource as a terrorism prevention force multiplier the development of a web based virtual knowledge sharing initiative was explored in this study as a solution to provide "one stop...

  17. Update on raloxifene: role in reducing the risk of invasive breast cancer in postmenopausal women

    Directory of Open Access Journals (Sweden)

    Vogel VG

    2011-10-01

    Full Text Available Victor G Vogel Cancer Institute, Geisinger Health System, Danville, PA, USA Abstract: Risk factors allow us to define women who are at increased lifetime risk for breast cancer, and the most important factor is age. Benign breast disease increases risk, and the most important histologies are atypical lobular or ductal hyperplasia and lobular carcinoma in situ. Family history of breast cancer among first-degree relatives (mother, sisters, daughters also increases risk. Quantitative measures of risk give accurate predictions of breast cancer incidence for groups of women but not for individual subjects. Multiple published, randomized controlled trials, which employed selective estrogen receptor (ER modulators (SERMs, have demonstrated consistent reductions of 35% or greater in the risk of ER-positive invasive and noninvasive breast cancer in postmenopausal women. Professional organizations in the US now recommend the use of SERMs to reduce the risk of breast cancer in high-risk, postmenopausal women. Raloxifene and tamoxifen reduce the risk of ER-positive invasive breast cancer with equal efficacy, but raloxifene is associated with a lower risk of thromboembolic disease, benign uterine conditions, and cataracts than tamoxifen in postmenopausal women. No evidence exists establishing whether a reduction in breast cancer risk from either agent translates into reduced breast cancer mortality. Overall quality of life is similar with raloxifene or tamoxifen, but the incidence of dyspareunia, weight gain, and musculoskeletal complaints is higher with raloxifene use, whereas vasomotor symptoms, bladder incontinence, gynecologic symptoms, and leg cramps were higher with tamoxifen use. Keywords: selective estrogen receptor modulators (SERMs, raloxifene, risk reduction, chemoprevention

  18. Perceived Information Security, Information Privacy, Risk and Institutional Trust on Consumer€™s Trust in E-commerce

    OpenAIRE

    Parengkuan, Frane Maorets

    2014-01-01

    E-commerce is widely being used in nowadays generation where the business entrepreneur from small to large institution, has widely taken advantage on the internet to promote business and deliver information about their product. Consumer trust is an important aspect of e-commerce, and understanding its antecedents and consequences is a prime concern. This research designed to find out the influence of Perceived Information Security, Privacy, Risk and Institutional Trust on Consumers Trust in E...

  19. Meta-analyses on behavioral interventions to reduce the risk of transmission of HIV.

    Science.gov (United States)

    Vergidis, Paschalis I; Falagas, Matthew E

    2009-06-01

    Different behavioral interventions have found to be efficacious in reducing high-risk sexual activity. Interventions have been evaluated in both original research and meta-analytic reviews. Most of the studies have shown that interventions are efficacious among different study populations. In adolescents, both in- and out-of-the classroom interventions showed a decrease in the risk of unprotected sex. In African Americans, greater efficacy was found for interventions including peer education. For Latinos, effect was larger in interventions with segmentation in the same gender. Geographic and social isolation are barriers in approaching MSM. For IDUs, interventions provided within a treatment program have an impact on risk reduction above that produced by drug treatment alone. Finally, people diagnosed with HIV tend to reduce their sexual risk behavior. However, adherence to safe sex practices for life can be challenging. Relentless efforts for implementation of behavioral interventions to decrease high-risk behavior are necessary to decrease HIV transmission.

  20. Reducing health risk assigned to organic emissions from a chemical weapons incinerator.

    Science.gov (United States)

    Laman, David M; Weiler, B Douglas; Skeen, Rodney S

    2013-03-01

    Organic emissions from a chemical weapons incinerator have been characterized with an improved set of analytical methods to reduce the human health risk assigned to operations of the facility. A gas chromatography/mass selective detection method with substantially reduced detection limits has been used in conjunction with scanning electron microscopy/energy dispersive X-ray spectrometry and Fourier transform infrared microscopy to improve the speciation of semi-volatile and non-volatile organics emitted from the incinerator. The reduced detection limits have allowed a significant reduction in the assumed polycyclic aromatic hydrocarbon (PAH) and aminobiphenyl (ABP) emission rates used as inputs to the human health risk assessment for the incinerator. A mean factor of 17 decrease in assigned human health risk is realized for six common local exposure scenarios as a result of the reduced PAH and ABP detection limits.

  1. Public and physician's expectations and ethical concerns about electronic health record: Benefits outweigh risks except for information security.

    Science.gov (United States)

    Entzeridou, Eleni; Markopoulou, Evgenia; Mollaki, Vasiliki

    2018-02-01

    Electronic Health Record systems (EHRs) offer numerous benefits in health care but also pose certain risks. As we progress toward the implementation of EHRs, a more in-depth understanding of attitudes that influence overall levels of EHR support is required. To record public and physicians' awareness, expectations for, and ethical concerns about the use of EHRs. A convenience sample was surveyed for both the public and physicians. The Public's Questionnaire was distributed to the public in a printed and an online version. The Physicians' Questionnaire was distributed to physicians in an online version. The questionnaires requested demographic characteristics followed by close-ended questions enquiring about awareness, perceived impact, perceived risks, and ethical issues raised by EHR use. In total, 46% of the public and 91% of physicians were aware of EHRs. Physicians' and public opinions were comparable concerning the positive impact of EHRs on better, more effective, and faster decisions on the patients' health, on better coordination between hospitals/clinics and on quality and reduced cost of health care. However, physicians were concerned that an EHR system would be a burden for their finances, for their time concerning training on the system, for their everyday workload and workflow. The majority of the public generally agreed that they would worry about the possibility that a non-authorized, third party might gain access to their personal health information (48.8%), and that they would worry about future discriminations due to possible disclosure of their health information (48.8%). Most physicians disagreed that EHRs will disrupt the doctor-patient relationship (58.1%) but they would worry about the safety of their patients' information (53.1%). Overall, both the public and physicians were in favor of the implementation of an EHR system, evaluating that possible benefits are more important than possible risks. The majority of the public believed that

  2. Applying the Action-Research Method to Develop a Methodology to Reduce the Installation and Maintenance Times of Information Security Management Systems

    Directory of Open Access Journals (Sweden)

    Antonio Santos-Olmo

    2016-07-01

    Full Text Available Society is increasingly dependent on Information Security Management Systems (ISMS, and having these kind of systems has become vital for the development of Small and Medium-Sized Enterprises (SMEs. However, these companies require ISMS that have been adapted to their special features and have been optimized as regards the resources needed to deploy and maintain them, with very low costs and short implementation periods. This paper discusses the different cycles carried out using the ‘Action Research (AR’ method, which have allowed the development of a security management methodology for SMEs that is able to automate processes and reduce the implementation time of the ISMS.

  3. Cryptographic Combinatorial Securities Exchanges

    Science.gov (United States)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  4. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implemented a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.

  5. Risk factors for oral diseases among workers with and without dental insurance in a national social security scheme in India.

    Science.gov (United States)

    Singh, Abhinav; Purohit, Bharathi M; Masih, Nitin; Kahndelwal, Praveen Kumar

    2014-04-01

    The target population for this cross sectional study comprises subjects with and without social security in a national social security scheme. The study aimed to compare and assess the risk factors for oral diseases among insured (organised sector) and non-insured workers (unorganised sector) in New Delhi, India. The sample comprised a total of 2,752 subjects. Of these, 960 workers belonged to the formal or organised sector with a social security and dental health insurance and 1,792 had no social security or dental insurance from the informal or unorganised sector. Significant differences were noted between the two groups for literacy levels, between-meal sugar consumption, tobacco-related habits and utilisation of dental care. Bleeding/calculus and periodontal pockets were present among 25% and 65.4% of insured workers, respectively. Similarly, 13.6% and 84.5% of non-insured workers had bleeding/calculus and periodontal pockets, respectively. The mean DMFT (decayed, missing, filled teeth) value among the insured workers and non-insured workers was 3.27 ± 1.98 and 3.75 ± 1.80, respectively. The association between absence of health insurance and dental caries was evident with an odds ratio (OR) of 1.94. Subjects with below graduate education were more prone to dental caries (OR = 1.62). Subjects who cleaned their teeth two or more times a day were less likely to have dental caries (OR = 1.47). Utilisation of dental care was inversely related to dental caries (OR = 1.25). The major risk factors for oral diseases in both the groups with similar socio-economic status were the lack of social security and health insurance, low literacy levels, high tobacco consumption and low levels of dental care utilisation. © 2013 FDI World Dental Federation.

  6. MANAGEMENT OF SECURITY FOR BANK LOANS ON THE BASIS OF RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Viktoriia Kovalenko

    2016-03-01

    Full Text Available The article aims to study methods and tools for risk management to ensure bank loans.  Proved that the effectiveness of risk management to ensure bank loans depends on consistency,  adequacy methods of evaluation, quality monitoring and timely response system of the banks and the  regulator. The article is to develop recommendations to improve the effectiveness of risk management providing bank loans considering the risks inherent in the process support mortgage portfolio of banks in the  face of considerable uncertainty functioning banks. It is proved that the risk provision of bank loans in the loan management should be considered  through risk characteristics that form the aggregate credit risk. Substantiated that risk management software meets the classic risk management, which identifies  four main stages: identification; risk assessment software; control risk; minimizing risk. Keywords: credit risk provision, loan, risk management, reserves.JEL: G 28

  7. Bio-Security Proficiencies Project for Beginning Producers in 4-H

    Science.gov (United States)

    Smith, Martin H.; Meehan, Cheryl L.; Borba, John A.

    2014-01-01

    Improving bio-security practices among 4-H members who raise and show project animals is important. Bio-security measures can reduce the risk of disease spread and mitigate potential health and economic risks of disease outbreaks involving animal and zoonotic pathogens. Survey data provided statistical evidence that the Bio-Security Proficiencies…

  8. Increase plant safety and reduce cost by implementing risk-informed in-service inspection programs

    International Nuclear Information System (INIS)

    Billington, A.; Monette, P.

    2001-01-01

    The idea behind the program is that it is possible to 'inspect less, but inspect better'. In other words, the risk-informed In-Service Inspection (ISI) process is used to improve the effectiveness of examination of piping components, i.e. concentrate inspection resources and enhance inspection strategies on high safety significant locations, and reduce inspection requirements on others. The Westinghouse Owners Group (WOG) risk-informed ISI process has already been applied for full scope (Millstone 3, Surry 1) and limited scope (Beznau, Ringhals 4, Asco, Turkey Point 3). By examining the high safety significant piping segments for the different fluid piping systems, the total piping core damage frequency is reduced. In addition, more than 80% of the risk associated with potential pressure boundary failures is addressed with the WOG risk-informed ISI process, while typically less that 50% of this same risk is addressed by the current inspection programs. The risk-informed ISI processes are used to improve the effectiveness of inspecting safety-significant piping components, to reduce inspection requirements on other piping components, to evaluate improvements to plant availability and enhanced safety measures, including reduction of personnel radiation exposure, and to reduce overall Operation and Maintenance (O and M) costs while maintaining regulatory compliance. A description of the process as well as benefits from past projects is presented, since the methodology is applicable for WWER plant design. (author)

  9. Increase plant safety and reduce cost by implementing risk-informed In-Service Inspection programs

    International Nuclear Information System (INIS)

    Billington, A.; Monette, P.; Doumont, C.

    2000-01-01

    The idea behind the program is that it is possible to 'inspect less, but inspect better'. In other words, the risk-informed In-Service Inspection (ISI) process is used to improve the effectiveness of examination of piping components, i.e. concentrate inspection resources and enhance inspection strategies on high safety significant locations, and reduce inspection requirements on others. The Westinghouse Owners Group (WOG) risk-informed ISI process has already been applied for full scope (Millstone 3, Surry 1) and limited scope (Beznau, Ringhals 4, Asco, Turkey Point 3). By examining the high safety significant piping segments for the different fluid piping systems, the total piping core damage frequency is reduced. In addition, more than 80% of the risk associated with potential pressure boundary failures is addressed with the WOG risk-informed ISI process, while typically less than 50% of this same risk is addressed by the current inspection programs. The risk-informed ISI processes are used: to improve the effectiveness of inspecting safety-significant piping components; to reduce inspection requirements on other piping components; to evaluate improvements to plant availability and enhanced safety measures, including reduction of personnel radiation exposure; and to reduce overall Operation and Maintenance (O and M) costs while maintaining regulatory compliance. A description of the process as well as benefits of past projects is presented, since the methodology is applicable for VVER plant design. (author)

  10. Perceptions of Risk of Developing Skin Cancer for Diverse Audiences: Enhancing Relevance of Sun Protection to Reduce the Risk.

    Science.gov (United States)

    Robinson, June K; Friedewald, John; Gordon, Elisa J

    2016-03-01

    Sixty-five percent of kidney transplant recipients (KTRs) develop squamous cell carcinoma (SCC). Perceptions of risk of developing skin cancer, amelioration of this risk with sun protection, and having choices among sun protection strategies may enhance sun protection use by KTRS, who are at greater risk than the general population. Thirty KTRs stratified among non-Hispanic Whites, non-Hispanic Blacks, and Hispanic/Latinos evaluated three versions of the interactive, web-based, electronic sun protection program and suggested refinements. The sequence of content presentation prepared the participant to accept the credibility, accuracy, and relevance of the message. Beginning with informing participants that using sun protection reduces the chance of developing skin cancer made the information credible to KTRs. Showing skin cancer on all skin types and patient testimonials enhanced participants' awareness of their susceptibility to develop skin cancer and primed patients to receive their personal risk of developing skin cancer. Coupling presentation of knowledge about the benefits of sun protection in reducing the risk of developing skin cancer with the personal risk of getting the disease was essential to KTRs believing that they could influence their health outcome.

  11. Reducing sexual risk behavior among high-risk couples in Northern India.

    Science.gov (United States)

    Jones, Deborah; Bagga, Rashmi; Nehra, Ritu; Deepika; Sethi, Sunil; Walia, Kamini; Kumar, Mahendra; Villar-Loubet, Olga; Lopez, Maria; Weiss, Stephen M

    2013-09-01

    With a population of 1.1 billion, India is considered to be a country in which effective prevention interventions could contain the development of a human immunodeficiency virus (HIV) epidemic. Heterosexual transmission accounts for 85 % of the extant HIV infections. This study sought to assess the feasibility of conducting a group, culturally tailored behavioral intervention and its impact on sexual barrier use, self-efficacy, knowledge, conflict resolution, and coping among high-risk heterosexual couples in Northern India. This pilot study was conducted at the Postgraduate Institute of Medical Education and Research (PGIMER), Chandigarh, India from February 2008 to January 2009. Thirty sexually active high-risk couples were drawn from a convenience sample of PGIMER patients attending infectious disease and family planning clinics. Couples participated in 1 month of three weekly gender-concordant behavioral intervention groups and were individually administered assessments preintervention and post-intervention. The intervention was tailored to the Northern Indian context and addressed sexual barrier use, human immunodeficiency virus (HIV)/sexually transmitted infection transmission, and cognitive behavioral skill building focusing on sexual negotiation and communication. The participants had a mean age of 32 years (men) and 29 years (women), and the majority had at least 10 years of education. At baseline, the majority reported inconsistent condom use (knowledge, and women increased their use of positive coping tactics. The results highlight the potential to successfully utilize a group intervention to discuss sensitive issues such as sexual risk behavior among both men and women. Strategies to improve condom use and communication without increasing intimate partner violence in high-risk couples may be an important adjunct to preventing the development of a generalized epidemic in India.

  12. Simple risk stratification at admission to identify patients with reduced mortality from primary angioplasty

    DEFF Research Database (Denmark)

    Thune, Jens Jakob; Hoefsten, Dan Eik; Lindholm, Matias Greve

    2005-01-01

    BACKGROUND: Randomized trials comparing fibrinolysis with primary angioplasty for acute ST-elevation myocardial infarction have demonstrated a beneficial effect of primary angioplasty on the combined end point of death, reinfarction, and disabling stroke but not on all-cause death. Identifying...... a patient group with reduced mortality from an invasive strategy would be important for early triage. The Thrombolysis in Myocardial Infarction (TIMI) risk score is a simple validated integer score that makes it possible to identify high-risk patients on admission to hospital. We hypothesized that a high...... as high risk. There was a significant interaction between risk status and effect of primary angioplasty (P=0.008). In the low-risk group, there was no difference in mortality (primary angioplasty, 8.0%; fibrinolysis, 5.6%; P=0.11); in the high-risk group, there was a significant reduction in mortality...

  13. Policies for Reducing Coastal Risk on the East and Gulf Coasts

    Science.gov (United States)

    Glickson, D.; Johnson, S.

    2014-12-01

    Hurricane- and coastal storm-related economic losses have increased substantially over the past century, largely due to expanding population and development in susceptible coastal areas. Concurrent with this growth, the federal government has assumed an increasing proportion of the financial responsibility associated with U.S. coastal storms, which may discourage state and local governments from taking appropriate actions to reduce risk and enhance resilience. Strategies to manage coastal storm risks fall into two categories: reducing the probability of flooding or wave impact (such as seawalls, storm surge barriers, beach nourishment, dune building, restoration/expansion of oyster reefs, salt marshes, and mangroves) and reducing the number or vulnerability of people or structures (such as relocation, land-use planning, and elevating or floodproofing buildings). Over the past century, most coastal risk management programs have emphasized coastal armoring, while doing little to decrease development in harm's way. This National Research Council report calls for the development of a national vision for managing coastal risks that includes a long-term view, regional solutions, and recognition of all benefits. A national coastal risk assessment is needed to identify high priority areas. Benefit-cost analysis provides a reasonable framework to evaluate national investments in coastal risk reduction, if constrained by other important environmental, social, and life-safety factors. Extensive collaboration and additional policy changes will be necessary to move from a nation that is primarily reactive to coastal disasters to one that invests wisely in coastal risk reduction and builds resilience among coastal communities.

  14. Reduced risk avoidance and altered neural correlates of feedback processing in patients with borderline personality disorder.

    Science.gov (United States)

    Endrass, Tanja; Schuermann, Beate; Roepke, Stefan; Kessler-Scheil, Sonia; Kathmann, Norbert

    2016-09-30

    Patients with borderline personality disorder (BPD) show deficits in reward-guided decision making and learning. The present study examined risk-taking behavior in combination with feedback processing. Eighteen BPD patients and 18 healthy controls performed a probabilistic two-choice gambling task, while an electroencephalogram was recorded. Options differed in risk, but were identical in expected value and outcome probability. The feedback-related negativity (FRN) and the feedback-related P300 were analyzed. Healthy controls preferred low-risk over high-risk options, whereas BPD patients chose both option with equal probability. FRN amplitudes were reduced in BPD, but effects of feedback valence and risk did not differ between groups. This suggests attenuated outcome processing in the anterior cingulate cortex, but intact reward prediction error signaling. Furthermore, the modulation of the feedback-related P300 with feedback valence and risk was smaller in BPD patients, and decreased P300 amplitudes were associated with increased behavioral risk-taking behavior. These findings could relate to the reduced ability of BPD patients to learn and adequately adjust their behavior based on feedback information, possibly due to reduced significance of negative feedback. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  15. Multi-Risk Infants: Predicting Attachment Security from Sociodemographic, Psychosocial, and Health Risk among African-American Preterm Infants

    Science.gov (United States)

    Candelaria, Margo; Teti, Douglas M.; Black, Maureen M.

    2011-01-01

    Background: Ecological and transactional theories link child outcomes to accumulated risk. This study hypothesized that cumulative risk was negatively related to attachment, and that maternal sensitivity mediated linkages between risk and attachment. Methods: One hundred and twelve high-risk African-American premature infant-mother dyads…

  16. Reducing risks and increasing safety in everyday life: the role of the public

    International Nuclear Information System (INIS)

    Enander, A.

    1998-01-01

    Full text of publication follows: in social science risk research more attention has been paid to examining how people in general perceive risks than to how they perceive possible measures to reduce risks and to increase their own safety. The latter area is, however, becoming increasingly important to understand, particularly in the light of current emphasis on individual responsibility in risk prevention and emergency preparedness. For example, in Sweden a major effort to increase safety awareness among the general public and to increase knowledge and skills in a number of safety-related areas is at present being planned. This effort is being undertaken as a cooperative effort between different authorities and institutions and is coordinated by the Swedish Rescue Services Agency. The intentions behind this and similar programmes raise a number of questions concerning how people view risks and safety measures in their own immediate environment. Knowledge of the factors affecting willingness to take precautions is important in the design of communication and information. The factors which are of significance may be risk-related and concern perceptions of personal risk, but may also be related to attitudes an beliefs concerning different precautionary measures, to perception of social norms and conventions as well as to personal experiences and values. This paper presents some data concerning views and actions among lay groups in relation to reducing risks and increasing safety. Factors affecting these views are discussed in the light of previous research and of empirical data from some recent studies. (author)

  17. The Department of Homeland Security's Risk Assessment Methodology: Evolution, Issues, and Options for Congress

    National Research Council Canada - National Science Library

    Masse, Todd; O'Neil, Siobhan; Rollins, John

    2007-01-01

    .... Secretary Chertoff has stated "DHS must base its work on priorities driven by risk" and, increasingly, risk assessment and subsequent risk mitigation have influenced all of the department's efforts...

  18. Development Methodology of a Cyber Security Risk Analysis and Assessment Tool for Digital I and C Systems in Nuclear Power Plant

    International Nuclear Information System (INIS)

    Cha, K. H.; Lee, C. K.; Song, J. G.; Lee, Y. J.; Kim, J. Y.; Lee, J. W.; Lee, D. Y.

    2011-01-01

    With the use of digital computers and communication networks the hot issues on cyber security were raised about 10 years ago. The scope of cyber security application has now been extended from the safety Instrumentation and Control (I and C) system to safety important systems, plant security system, and emergency preparedness system. Therefore, cyber security should be assessed and managed systematically throughout the development life cycle of I and C systems in order for their digital assets to be protected from cyber attacks. Fig. 1 shows the concept of a cyber security risk management of digital I and C systems in nuclear power plants (NPPs). A lot of cyber security risk assessment methods, techniques, and supported tools have been developed for Information Technology (IT) systems, but they have not been utilized widely for cyber security risk assessments of the digital I and C systems in NPPs. The main reason is a difference in goals between IT systems and nuclear I and C systems. Confidentiality is important in IT systems, but availability and integrity are important in nuclear I and C systems. Last year, it was started to develop a software tool to be specialized for the development process of nuclear I and C systems. This paper presents a development methodology of the Cyber Security Risk analysis and Assessment Tool (CSRAT) for the digital I and C systems in NPP

  19. Development Methodology of a Cyber Security Risk Analysis and Assessment Tool for Digital I and C Systems in Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Cha, K. H.; Lee, C. K.; Song, J. G.; Lee, Y. J.; Kim, J. Y.; Lee, J. W.; Lee, D. Y. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2011-05-15

    With the use of digital computers and communication networks the hot issues on cyber security were raised about 10 years ago. The scope of cyber security application has now been extended from the safety Instrumentation and Control (I and C) system to safety important systems, plant security system, and emergency preparedness system. Therefore, cyber security should be assessed and managed systematically throughout the development life cycle of I and C systems in order for their digital assets to be protected from cyber attacks. Fig. 1 shows the concept of a cyber security risk management of digital I and C systems in nuclear power plants (NPPs). A lot of cyber security risk assessment methods, techniques, and supported tools have been developed for Information Technology (IT) systems, but they have not been utilized widely for cyber security risk assessments of the digital I and C systems in NPPs. The main reason is a difference in goals between IT systems and nuclear I and C systems. Confidentiality is important in IT systems, but availability and integrity are important in nuclear I and C systems. Last year, it was started to develop a software tool to be specialized for the development process of nuclear I and C systems. This paper presents a development methodology of the Cyber Security Risk analysis and Assessment Tool (CSRAT) for the digital I and C systems in NPP

  20. The interplay between gait, falls and cognition: can cognitive therapy reduce fall risk?

    Science.gov (United States)

    Segev-Jacubovski, Orit; Herman, Talia; Yogev-Seligmann, Galit; Mirelman, Anat; Giladi, Nir; Hausdorff, Jeffrey M

    2011-01-01

    In this article, we briefly summarize the incidence and significant consequences of falls among older adults, the insufficient effectiveness of commonly used multifactorial interventions and the evidence linking falls and cognitive function. Recent pharmacologic and nonpharmacologic studies that evaluated the effects of cognitive therapy on fall risk are reviewed. The results of this article illustrate the potential utility of multiple, diverse forms of cognitive therapy for reducing fall risk. The article also indicates that large-scale, randomized controlled trials are warranted and that additional research is needed to better understand the pathophysiologic mechanisms underlying the interplay between human mobility, fall risk and cognitive function. Nonetheless, we suggest that multimodality interventions that combine motor and cognitive therapy should, eventually, be incorporated into clinical practice to enable older adults and patients to move safer and with a reduced fall risk. PMID:21721921