WorldWideScience

Sample records for school security measures

  1. Punishment in School: The Role of School Security Measures

    Directory of Open Access Journals (Sweden)

    Thomas J Mowen

    2014-09-01

    Full Text Available Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001, perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010, and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004; Kupchik, 2010, few studies have sought to explore the impacts of these measures on suspension rates. Using data from the Educational Longitudinal Study (2002, I explore the relationship between security measures and in-school, out-of-school, and overall suspension rates. Results indicate schools with a security officer experience higher rates of in-school suspensions but have no difference in rates of out-of-school or overall suspensions compared to schools without a security officer. No other measure of security was related to higher suspension rates. As prior literature suggests, schools with greater proportions of black students experienced significantly higher rates of all suspension types. Finally, different types of parental involvement correlated with both higher and lower suspension rates.

  2. Punishment in School: The Role of School Security Measures

    Science.gov (United States)

    Mowen, Thomas J.

    2014-01-01

    Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001), perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010), and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004;…

  3. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    Science.gov (United States)

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  4. School Security Measures and Longitudinal Trends in Adolescents' Experiences of Victimization.

    Science.gov (United States)

    Fisher, Benjamin W; Mowen, Thomas J; Boman, John H

    2018-06-01

    Although school security measures have become a common fixture in public schools across the United States, research on the relationship between security and adolescent victimization is mixed, with very few studies examining trends in adolescent victimization across time. Using two waves of data from the Educational Longitudinal Study 2002 (N = 7659; 50.6% female; 56.7% White, 13.3% Black, 13.5% Hispanic, 11.3% Asian American, 5.4% other race), results from a series of multi-level models demonstrate that adolescents in schools with more security measures report higher odds of being threatened with harm, and no difference in odds of being in a physical altercation or having something stolen over time. Although prior research has established racial disparities in using school security measures, results demonstrate inconsistent patterns in the extent to which adolescents' race conditions the relationship between security and victimization. The findings are discussed in light of existing theoretical and empirical work, and implications for both research and practice are offered.

  5. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    Science.gov (United States)

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  6. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are cschools incorporate good security practices, which will rarely increase new building costs if included in the initial planning.

  7. The "School Safety & Security Questionnaire": Middle Grades Students' Perceptions of Safety at School

    Science.gov (United States)

    Miller, Janice Williams; Nickell, Linda K.

    2008-01-01

    This study presents the development and basic psychometric characteristics of the "School Safety and Security Questionnaire" (SSSQ). This new measure was constructed to assess middle grade students' perceptions of safety and security during the school year. The content validity of the theoretically-based instrument was assessed and the measure was…

  8. School Security: For Whom and with What Results?

    Science.gov (United States)

    Servoss, Timothy J.; Finn, Jeremy D.

    2014-01-01

    This study utilized school-level data from several combined national databases to address two questions regarding school security policy: (1) What are the school characteristics related to levels of security? (2) How does security relate to school suspension, dropout, and college attendance rates? Among the predictors of school security, having a…

  9. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    Science.gov (United States)

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  10. Today's School Security

    Science.gov (United States)

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  11. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  12. School Security: Planning and Costs.

    Science.gov (United States)

    Hunter, Richard C.; Mazingo, Terri H.

    2003-01-01

    Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…

  13. Summary Report for the Radiation Detection for Nuclear Security Summer School 2012

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C.; Baciak, James E.; Stave, Jean A.

    2012-08-22

    The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; the second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.

  14. Status of School Safety and Security among Elementary Schools in the Fifth Class Municipality

    Directory of Open Access Journals (Sweden)

    Cresente E. Glariana

    2015-12-01

    Full Text Available This study attempted to determine the status of school safety and security in terms of the school sites, school playground, school canteen services, water safety, fire safety, campus security, building security, and sanitary facilities situation in eight (8 elementary schools in Libertad town. The descriptive survey was used to find out the status of school safety and security in the elementary schools of Libertad, Misamis Oriental. A checklist on the standards of facilities as implemented by the Department of Education was used to gather the data. Checklist was based from the 2010 Educational Facilities Manual. Evaluation based on the checklist showed that some of standards on 2010 Educational Facilities Manual were not observed. The schools have not complied with the requirements and specifications. The evaluation showed further that most of the schools did not comply within the standards set by the 2010 Educational Facilities Manual. School authorities may review the standards in the 2010 Educational Facilities Manual. The school should try to meet the standard to ensure safety and security of the pupils. Action plan may be prepared to be implemented in case of emergency.

  15. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  16. How to Establish Security Awareness in Schools

    Science.gov (United States)

    Beyer, Anja; Westendorf, Christiane

    The internet is a fast changing medium and comprises several websites fraught with risk. In this context especially young age groups are endangered. They have less experience using the media and little knowledge on existing internet risks. There are a number of initiatives, which are engaged in the topic of internet safety. They provide information about measures on how to prevent and to deal with internet risks. However it is not certain if these initiatives do reach their target group (children and adolescents). In this regard schools bear a special relevance, since they have the knowledge about didactic methods and the chance to address measures directly to children and adolescents. The authors of this paper provide an overview of current security education in German schools, problems and open questions. Finally the authors make recommendations on how to establish internet safety in schools.

  17. MCPS School Safety & Security at a Glance 2013-2014

    Science.gov (United States)

    Montgomery County Public Schools, 2014

    2014-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  18. MCPS School Safety & Security at a Glance 2012-2013

    Science.gov (United States)

    Montgomery County Public Schools, 2013

    2013-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  19. MCPS School Safety & Security at a Glance 2011-2012

    Science.gov (United States)

    Montgomery County Public Schools, 2012

    2012-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  20. Summary Report for the Radiation Detection for Nuclear Security Summer School 2014

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Baciak, James E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodring, Mitchell L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Jenno, Diana M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-09-01

    Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.

  1. Staying Secure for School Safety

    Science.gov (United States)

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  2. MCPS School Safety and Security at a Glance 2009-2010

    Science.gov (United States)

    Montgomery County Public Schools, 2010

    2010-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) public schools. The information is presented for each school.…

  3. MCPS School Safety and Security at a Glance 2008-2009

    Science.gov (United States)

    Montgomery County Public Schools, 2009

    2009-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…

  4. MCPS School Safety and Security at a Glance 2010-2011

    Science.gov (United States)

    Montgomery County Public Schools, 2011

    2011-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…

  5. The Hidden Cost of School Security

    Science.gov (United States)

    DeAngelis, Karen J.; Brent, Brian O.; Ianni, Danielle

    2011-01-01

    A spate of school shootings in the U.S. has prompted policymakers to address the public's growing perception that our schools are unsafe. As education policymakers continue to press for additional security initiatives, it is important to understand the costs borne by school systems for these programs. Thus far, the scholarly literature is silent…

  6. School Security and Crisis Preparedness: Make It Your Business.

    Science.gov (United States)

    Trump, Kenneth S.

    1999-01-01

    The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…

  7. Experience of executing security measures

    International Nuclear Information System (INIS)

    Nakano, Hiromasa

    1995-01-01

    Japan possesses many nuclear power stations and atomic energy research and development facilities, and obtained much experience of security measures such as the inspection by the government and IAEA, the technical development and so on in respective facilities. In this report, the activities of security measures in Japan are introduced, centering around the experience of Power Reactor and Nuclear Fuel Development Corporation. Japan ratified the nuclear nonproliferation treaty (NPT) in 1976, and concluded the agreement with IAEA in 1977. It is called security measures to technically confirm that nuclear substances are not used for nuclear weapons, and to find early and prevent the production of nuclear weapons. The security measures consist of the quantity management by the balance of nuclear substances are the inspection by the government and IAEA. The present state of security measures in centrifugal uranium enrichment plants, the fabrication factories of low enriched uranium fuel, nuclear reactors, fuel reprocessing plants, and plutonium fuel factories is reported. The amount of inspection works of the government was 1861 man-day/year in 1993. As the subjects related to security measures of hereafter, the quantity management by respective facilities, the technology of verifying the measurement by inspectors, the points of beginning and finishing security measures, the security measures of hereafter and the international cooperation are described. (K.I.)

  8. Security Measures in Data Mining

    OpenAIRE

    Anish Gupta; Vimal Bibhu; Rashid Hussain

    2012-01-01

    Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determin...

  9. Safety and Security in Schools in KwaZulu-Natal

    Science.gov (United States)

    White, C. J.; Gina, J. M.; Coetzee, I. E. M.

    2015-01-01

    This article is based on research conducted on the topic: "Safety and security in schools: The case of KwaZulu-Natal." For the research project a purposive sample consisting of secondary school learners, teachers, school governing body chairpersons and principals were selected from the rural and township schools used in this study to…

  10. Safety and Security at School: A Pedagogical Perspective

    Science.gov (United States)

    de Waal, Elda; Grosser, M. M.

    2009-01-01

    Education law and policy currently focus on broader physical aspects of safety and security at schools, as well as, for example, on pedagogical insecurity such as is caused by discriminatory teaching, but law and policy have yet to pay attention to the overall and far-reaching pedagogical safety and security of learners. By means of a descriptive…

  11. Solar Secure Schools: Strategies and Guidelines; October 2004--April 2005

    Energy Technology Data Exchange (ETDEWEB)

    Braun, G. W.; Varadi, P. F.

    2006-01-01

    This report explores the technical and economic aspects of installing solar power (photovoltaic aka PV) systems on schools to improve the schools' energy security and provide power during disasters.

  12. Systematic, appropriate, and cost-effective application of security technologies in U.S. public schools to reduce crime, violence, and drugs

    Science.gov (United States)

    Green, Mary W.

    1997-01-01

    As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.

  13. Education secured? The school performance of adolescents in secure residential youth care

    NARCIS (Netherlands)

    Harder, Annemiek T.; Huyghen, Anne-Marie N.; Knot-Dickscheit, Jana; Kalverboer, Margrite E.; Köngeter, Stefan; Zeller, Maren; Knorth, Erik J.

    Despite poor school performance by adolescents in secure residential care and the potential importance of education during care, little is known about how to achieve academic success with these adolescents. Therefore, the aim of the present study is to assess adolescents' academic achievement during

  14. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  15. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  16. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    Science.gov (United States)

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  17. 76 FR 54196 - Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee

    Science.gov (United States)

    2011-08-31

    ... DEPARTMENT OF AGRICULTURE Forest Service Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: In accordance with the Secure Rural Schools and Community Self Determination Act of 2000 (Pub. L. 106-393), [as...

  18. INFORMATION SECURITY IN MOBILE MODULAR MEASURING SYSTEMS

    Directory of Open Access Journals (Sweden)

    A. N. Tkhishev

    2017-01-01

    Full Text Available A special aspect of aircraft test is carrying out both flight evaluation and ground operation evaluation in a structure of flying aids and special tools equipment. The specific of flight and sea tests involve metering in offshore zone, which excludes the possibility of fixed geodetically related measuring tools. In this regard, the specific role is acquired by shipbased measurement systems, in particular the mobile modular measuring systems. Information processed in the mobile modular measurement systems is a critical resource having a high level of confidentiality. When carrying out their functions, it should be implemented a proper information control of the mobile modular measurement systems to ensure their protection from the risk of data leakage, modification or loss, i.e. to ensure a certain level of information security. Due to the specific of their application it is difficult to solve the problems of information security in such complexes. The intruder model, the threat model, the security requirements generated for fixed informatization objects are not applicable to mobile systems. It was concluded that the advanced mobile modular measuring systems designed for flight experiments monitoring and control should be created due to necessary information protection measures and means. The article contains a diagram of security requirements formation, starting with the data envelopment analysis and ending with the practical implementation. The information security probabilistic model applied to mobile modular measurement systems is developed. The list of current security threats based on the environment and specific of the mobile measurement system functioning is examined. The probabilistic model of the information security evaluation is given. The problems of vulnerabilities transformation of designed information system into the security targets with the subsequent formation of the functional and trust requirements list are examined.

  19. Measuring Information Security: Guidelines to Build Metrics

    Science.gov (United States)

    von Faber, Eberhard

    Measuring information security is a genuine interest of security managers. With metrics they can develop their security organization's visibility and standing within the enterprise or public authority as a whole. Organizations using information technology need to use security metrics. Despite the clear demands and advantages, security metrics are often poorly developed or ineffective parameters are collected and analysed. This paper describes best practices for the development of security metrics. First attention is drawn to motivation showing both requirements and benefits. The main body of this paper lists things which need to be observed (characteristic of metrics), things which can be measured (how measurements can be conducted) and steps for the development and implementation of metrics (procedures and planning). Analysis and communication is also key when using security metrics. Examples are also given in order to develop a better understanding. The author wants to resume, continue and develop the discussion about a topic which is or increasingly will be a critical factor of success for any security managers in larger organizations.

  20. Measuring relational security in forensic mental health services.

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  1. Measuring relational security in forensic mental health services

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  2. Low-level violence in schools: is there an association between school safety measures and peer victimization?

    Science.gov (United States)

    Blosnich, John; Bossarte, Robert

    2011-02-01

    Low-level violent behavior, particularly school bullying, remains a critical public health issue that has been associated with negative mental and physical health outcomes. School-based prevention programs, while a valuable line of defense to stave off bullying, have shown inconsistent results in terms of decreasing bullying. This study explored whether school safety measures (eg, security guards, cameras, ID badges) were associated with student reports of different forms of peer victimization related to bullying. Data came from the 2007 School Crime Supplement of the National Crime Victimization Survey. Chi-square tests of independence were used to examine differences among categorical variables. Logistic regression models were constructed for the peer victimization outcomes. A count variable was constructed among the bullying outcomes (0-7) with which a Poisson regression model was constructed to analyze school safety measures' impacts on degree of victimization. Of the various school safety measures, only having adults in hallways resulted in a significant reduction in odds of being physically bullied, having property vandalized, or having rumors spread. In terms of degree of victimization, having adults and/or staff supervising hallways was associated with an approximate 26% decrease in students experiencing an additional form of peer victimization. Results indicated that school safety measures overall were not associated with decreased reports of low-level violent behaviors related to bullying. More research is needed to further explore what best promotes comprehensive safety in schools. © 2011, American School Health Association.

  3. [The concept and measurement of food security].

    Science.gov (United States)

    Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon

    2008-11-01

    During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

  4. Portfolio analysis of layered security measures.

    Science.gov (United States)

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. © 2014 Society for Risk Analysis.

  5. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  6. Measuring the Perception of Travel Security – Comparative Analysis of Students in Two Different Fields: Tourism and Security

    Directory of Open Access Journals (Sweden)

    Sebastjan Repnik

    2015-01-01

    Full Text Available The aim of the research was to determine how students/respondents perceive security on their travels in Europe. The respondents belong to two different study programmes, one focusing on the field of security (Faculty of Criminal Justice and Security, University of Maribor and the other on the field of tourism (Higher Vocational School for Catering and Tourism. Our main presumption was that students of the two institutions developed a different attitude towards travel security since their studies focus on two substantively different academic-professional fields. We examined their attitude towards security factors such as: security climate, self-protection and collective security. In our research we included a sample of 100 students/respondents. We used an instrument in the form of a questionnaire for the quantitative measurement of responses on a 5-point Likert scale. To portray the results of the research we also used various statistical indicators in the computer programme SPSS such as: arithmetic mean, Man-Whitney test, frequency distribution of responses, where independent variables are displayed. The findings suggest that the students/respondents attitude towards safety and their expectations on individual elements of all three security factors differ in the two target groups. The expectations of students/respondents of FCJS regarding the implementation and provision of security are higher compared to students/respondents of HVC. Respondents have different experience with security on their travels, as the number of travels varies quite substantially between students. Both institutions can use the results of the research in the evaluation processes of their study programmes. On the basis of the results of the research it is substantiated that the field and content of study have an impact on the students’ attitude to elements of security while travelling. The findings are intended to all researchers in the field of security and tourism, as

  7. Towards Comprehensive Food Security Measures: Comparing Key ...

    African Journals Online (AJOL)

    Food security is a multi-dimensional issue that has been difficult to measure comprehensively, given the one-dimensional focus of existing indicators. Three indicators dominate the food security measurement debate: Household Food Insecurity Access Scale (HFIAS), Dietary Diversity Score (DDS) and Coping Strategies ...

  8. Information Security Management Practices of K-12 School Districts

    Science.gov (United States)

    Nyachwaya, Samson

    2013-01-01

    The research problem addressed in this quantitative correlational study was the inadequacy of sound information security management (ISM) practices in K-12 school districts, despite their increasing ownership of information assets. Researchers have linked organizational and sociotechnical factors to the implementation of information security…

  9. An Assessment of Teacher Retention on Job Security in Private Secondary Schools in Ogun State, Nigeria

    Directory of Open Access Journals (Sweden)

    M.F. Faremi

    2017-12-01

    Full Text Available This study assessed the relationship between teacher retention and job security in private secondary schools in Ogun state, Nigeria. The study assessed ade-quacy in teaching and learning infrastructure, evaluated mode of recruitment of teachers, the factors responsible for high teacher turnover and teachers retention strategies employed in private secondary schools. Descriptive research of the survey design was employed in this study. Data were collected using questionnaire. Multistage sampling technique was used for data collection among 200 teachers including the school principals. Data collected were analyzed with a mixture of descriptive and inferential statistics. Percentages, mean and frequency counts were used to answer the research questions raised while Pearson Moment Correlation Coefficient and t-test analysis were used to test the formulated hypotheses at 0.05 level of significance. The findings from this study revealed that teaching and learning infrastructure were inadequate in most of the schools. It was observed that books, classroom and teachers were very adequate in some of the schools. However, few of the schools had internet facility for knowledge transfer and student exposure to the worldwide web. The study also showed that the proprietors were primarily responsible for staff recruitment although there were instances where formal advertisement for recruitment was made. The study further revealed a significant relationship between teacher retention strategies and job security in private secondary schools in Osun state. The study also showed a significant relationship between teacher turnover and job security in the schools. In addition, the findings showed a significant relationship between teacher turnover and job security in private secondary schools in Osun state. Lastly, the study revealed a significant difference in the mean rate and female teachers' turnover in the selected private secondary schools. Based on the

  10. A Survey on Security-Aware Measurement in SDN

    Directory of Open Access Journals (Sweden)

    Heng Zhang

    2018-01-01

    Full Text Available Software-defined networking (SDN is one of the most prevailing networking paradigms in current and next-generation networks. Basically, the highly featured separation of control and data planes makes SDN a proper solution towards many practical problems that challenge legacy networks, for example, energy efficiency, dynamic network configuration, agile network measurement, and flexible network deployment. Although the SDN and its applications have been extensively studied for several years, the research of SDN security is still in its infancy. Typically, the SDN suffers from architecture defect and OpenFlow protocol loopholes such as single controller problem, deficiency of communication verification, and network resources constraint. Hence, network measurement is a fundamental technique of protecting SDN against the above security threats. Specifically, network measurement aims to understand and quantify a variety of network behaviors to facilitate network management and monitoring, anomaly detection, network troubleshooting, and the establishment of security mechanisms. In this paper, we present a systematic survey on security-aware measurement technology in SDN. In particular, we first review the basic architecture of SDN and corresponding security challenges. Then, we investigate two performance measurement techniques in SDN, namely, link latency and available bandwidth measurements. After that, we further provide a general overview of topology measurement in SDN including intradomain and interdomain topology discovering techniques. Finally, we list three interesting future directions of security-aware measurement in SDN followed by giving conclusion remarks.

  11. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  12. Children's Food Security and Intakes from School Meals. Final Report. Contractor and Cooperator Report No. 61

    Science.gov (United States)

    Potamites, Elizabeth; Gordon, Anne

    2010-01-01

    Using 2005 data from the U.S. Department of Agriculture's Third School Nutrition Dietary Assessment survey, this study examines the contribution of school meals to the food and nutrient intake of children in food-secure, marginally secure, and food-insecure households. The study finds that children from food-insecure and marginally secure…

  13. Security Measures to Protect Mobile Agents

    Science.gov (United States)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  14. Validity and reliability of food security measures.

    Science.gov (United States)

    Cafiero, Carlo; Melgar-Quiñonez, Hugo R; Ballard, Terri J; Kepple, Anne W

    2014-12-01

    This paper reviews some of the existing food security indicators, discussing the validity of the underlying concept and the expected reliability of measures under reasonably feasible conditions. The main objective of the paper is to raise awareness on existing trade-offs between different qualities of possible food security measurement tools that must be taken into account when such tools are proposed for practical application, especially for use within an international monitoring framework. The hope is to provide a timely, useful contribution to the process leading to the definition of a food security goal and the associated monitoring framework within the post-2015 Development Agenda. © 2014 New York Academy of Sciences.

  15. Shootings Revive Debates on Security

    Science.gov (United States)

    Shah, Nirvi

    2013-01-01

    By nearly all accounts, the staff and students at Sandy Hook Elementary School did everything right on Dec. 14--and with the security measures they took before that day--when a young man armed with powerful weapons blasted his way into the school. But the deadliest K-12 school shooting in American history, a day that President Barack Obama has…

  16. Radioactive Sources in Medicine: Impact of Additional Security Measures

    International Nuclear Information System (INIS)

    Classic, K. L.; Vetter, R. J.; Nelson, K. L.

    2004-01-01

    For many years, medical centers and hospitals have utilized appropriate security measures to prevent theft or unauthorized use of radioactive materials. Recent anxiety about orphan sources and terrorism has heightened concern about diversion of radioactive sources for purposes of constructing a radiological dispersion device. Some medical centers and hospitals may have responded by conducting threat assessments and incorporating additional measures into their security plans, but uniform recommendations or regulations have not been promulgated by regulatory agencies. The International Atomic Energy Agency drafted interim guidance for the purpose of assisting member states in deciding what security measures should be taken for various radioactive sources. The recommendations are aimed at regulators, but suppliers and users also may find the recommendations to be helpful. The purpose of this paper is to describe threat assessments and additional security actions that were taken by one large and one medium-sized medical center and the impact these measures had on operations. Both medical centers possess blood bank irradiators, low-dose-rate therapy sources, and Mo-99/Tc-99m generators that are common to many health care organizations. Other medical devices that were evaluated include high-dose-rate after loaders, intravascular brachytherapy sources, a Co-60 stereotactic surgery unit, and self-shielded irradiators used in biomedical research. This paper will discuss the impact additional security has had on practices that utilize these sources, cost of various security alternatives, and the importance of a security culture in assuring the integrity of security measures without negatively impacting beneficial use of these sources. (Author) 10 refs

  17. Validity evidence for the Security Scale as a measure of perceived attachment security in adolescence.

    Science.gov (United States)

    Van Ryzin, Mark J; Leve, Leslie D

    2012-04-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  18. Perceived Attachment Security to Father, Academic Self-Concept and School Performance in Language Mastery

    Science.gov (United States)

    Bacro, Fabien

    2012-01-01

    This study examined the relations between 8-12-year-olds' perceived attachment security to father, academic self-concept and school performance in language mastery. One hundred and twenty two French students' perceptions of attachment to mother and to father were explored with the Security Scale and their academic self-concept was assessed with…

  19. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    Science.gov (United States)

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  20. Higher Stakes--The Hidden Risks of School Security Fences for Children's Learning Environments

    Science.gov (United States)

    Rooney, Tonya

    2015-01-01

    In a move away from the open or low-fenced grounds that have traditionally been a feature of Australian school design, the last decade has seen a growth in the installation of high-security fences around schools. These structures, far from being passive and neutral, act to redefine the possibilities for movement and connectivity in the local…

  1. Validation of the "Security Needs Assessment Profile" for measuring the profiles of security needs of Chinese forensic psychiatric inpatients.

    Science.gov (United States)

    Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M

    Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2007-01-01

    ... 1308 of Public Law 110-28. The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  3. Delictual Liability of the School Sports Coach - A Security Matter

    Directory of Open Access Journals (Sweden)

    JP Rossouw

    2011-10-01

    of all educators stems from the special relationship between an educator and a learner. Not acting to ensure the safety of a participant constitutes wrongfulness on the side of the educator-coach, which may lead to being held liable for damage to the participant. This article specifically considers the higher standard of care expected from the educator-coach, as compared to the normal reasonable person, based on the former's specific training in working with learners. The acts or omissions of higher qualified and more experienced educator-coaches will also be measured against a higher standard.This article concludes with the recommendation that educator-coaches should not be overly reassured by section 60 of the South African Schools Act. Ensuring the safety and security of learners should still be the main priority for all educators. Educator-coaches should remember that, true to their calling as educators, and consistent with section 28(2 of the Constitution, a child's best interests are of paramount importance in every matter concerning the child.

  4. Cost-effectiveness of Security Measures: A model-based Framework

    DEFF Research Database (Denmark)

    Pieters, Wolter; Probst, Christian W.; Lukszo, Zofia

    2014-01-01

    Recently, cyber security has become an important topic on the agenda of many organisations. It is already widely acknowledged that attacks do happen, and decision makers face the problem of how to respond. As it is almost impossible to secure a complex system completely, it is important to have...... an adequate estimate of the effectiveness of security measures when making investment decisions. Risk concepts are known in principle, but estimating the effectiveness of countermeasure proves to be difficult and cannot be achieved by qualitative approaches only. In this chapter, the authors consider...... the question of how to guarantee cost-effectiveness of security measures. They investigate the possibility of using existing frameworks and tools, the challenges in a security context as opposed to a safety context, and directions for future research....

  5. School Climate: An Essential Component of a Comprehensive School Safety Plan

    Science.gov (United States)

    Stark, Heidi

    2017-01-01

    The intentional assessment and management of school climate is an essential component of a comprehensive school safety plan. The value of this preventive aspect of school safety is often diminished as schools invest resources in physical security measures as a narrowly focused effort to increase school safety (Addington, 2009). This dissertation…

  6. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  7. Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model

    Directory of Open Access Journals (Sweden)

    Chun-Juan Ouyang

    2017-01-01

    Full Text Available Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.

  8. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2007-01-01

    This report to Congress, Measuring Stability and Security in Iraq, is submitted pursuant to Section 9010 of the Department of Defense Appropriations Act 2007, Public Law 109-289 as amended by Section...

  9. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  10. Religion, Schooling, Community, and Security: Exploring Transitions and Transformations in England

    Science.gov (United States)

    Lundie, David

    2017-01-01

    Education is a complex social practice. In the United Kingdom context, schooling is further nested within the complex social practices of community governance, quasi-market public choice, and religion. This essay explores the shifting definitions of community and education in the context of the Counter Terrorism and Security Act 2015, which places…

  11. New computer security measures

    CERN Multimedia

    IT Department

    2008-01-01

    As a part of the long-term strategy to improve computer security at CERN, and especially given the attention focused to CERN by the start-up of the LHC, two additional security measures concerning DNS and Tor will shortly be introduced. These are described in the following texts and will affect only a small number of users. "PHISHING" ATTACKS CONTINUE CERN computer users continue to be subjected to attacks by people trying to infect our machines and obtain passwords and other confidential information by social engineering trickery. Recent examples include an e-mail message sent from "La Poste" entitled "Colis Postal" on 21 August, a fake mail sent from web and mail services on 8 September, and an e-mail purporting to come from Hallmark Cards announcing the arrival of an electronic postcard. However, there are many other examples and there are reports of compromised mail accounts being used for more realistic site-specific phishing attempts. Given the increased publicity rela...

  12. Measuring School Contexts

    Directory of Open Access Journals (Sweden)

    Chandra L. Muller PhD

    2015-11-01

    Full Text Available This article describes issues in measuring school contexts with an eye toward understanding students’ experiences and outcomes. I begin with an overview of the conceptual underpinnings related to measuring contexts, briefly describe the initiatives at the National Center for Education Statistics to measure school contexts, and identify possible gaps in those initiatives that if filled could provide valuable new data for researchers. Next, I discuss new approaches and opportunities for measurement, and special considerations related to diverse populations and youth development. I conclude with recommendations for future priorities.

  13. Measuring the security of energy exports demand in OPEC economies

    International Nuclear Information System (INIS)

    Dike, Jude Chukwudi

    2013-01-01

    One of the objectives of OPEC is the security of demand for the crude oil exports of its members. Achieving this objective is imperative with the projected decline in OECD countries' crude oil demand among other crude oil demand shocks. This paper focuses on determining the external crude oil demand security risks of OPEC member states. In assessing these risks, this study introduces two indexes. The first index, Risky Energy Exports Demand (REED), indicates the level of energy export demand security risks for OPEC members. It combines measures of export dependence, economic dependence, monopsony risk and transportation risk. The second index, Contribution to OPEC Risk Exposure (CORE), indicates the individual contribution of the OPEC members to OPEC's risk exposure. This study utilises the disaggregated index approach in measuring energy demand security risks for crude oil and natural gas and involves a country level analysis. With the disaggregated approach, the study shows that OPEC's energy export demand security risks differ across countries and energy types. - Highlights: • REED and CORE indexes are suitable measures for energy exports demand security risk. • The indexes show that energy demand security risk is different for each OPEC country. • The countries contribution to OPEC's energy demand security risk is also different. • The outcome is necessary for OPEC's common energy and climate change policies. • The outcome makes a case for oil demand security as a topical issue in the literature

  14. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2008-01-01

    ... 1308 of Public Law 110-28 and Section 1224 of Public Law 110-181.1 The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  15. Security measures in transport of radiation source in Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Mohammad, Alslman [Korea Advanced Institute of Science and Technology, Kaist Daejeon (Korea, Republic of); Choi, Kwang Sik [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2011-05-15

    Radioactive materials are used in Jordan for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported, therefore trans-boundary movement is a significant factor in consideration of security measures during movement of these sources. After 11/9 2001 event, IAEA efforts began to focus and concentrate on security in transport of radioactive materials, after the emergence of risks of using these sources in terrorist activities. In 2002, Efforts were initiated by the IAEA to provide additional guidance for security in the transport of radioactive materials, based upon the new security requirements in the Recommendations on the Transport of Dangerous Goods. This paper reviews some of the measures relating to the transport of radioactive materials in Jordan

  16. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2008-01-01

    ... by Section 1308 of Public Law 110-28 and Section 1224 of Public Law 110-181. The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  17. MEASURING CHILDREN'S FOOD SECURITY IN U.S. HOUSEHOLDS, 1995-99

    OpenAIRE

    Nord, Mark; Bickel, Gary

    2002-01-01

    The capacity to accurately measure the food security status of children in household surveys is an essential tool for monitoring food insecurity and hunger at the most severe levels in U.S. households and for assessing programs designed to prevent or ameliorate these conditions. USDA has developed a children's food security scale to meet this measurement need. The scale is calculated from 8 questions in the 18-item food security survey module that ask specifically about food-related experienc...

  18. From Charity to Security: The Emergence of the National School Lunch Program

    Science.gov (United States)

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  19. The appropriate and effective use of security technologies in U.S. schools : a guide for schools and law enforcement agencies.

    Energy Technology Data Exchange (ETDEWEB)

    Green, Mary Wilson

    2005-06-01

    The purpose of this report is to provide school administrators with the ability to determine their security system requirements, so they can make informed decisions when working with vendors and others to improve their security posture. This is accomplished by (1) explaining a systems-based approach to defining the objectives and needs of the system, and (2), providing information on the ability of common components (sensors, cameras, metal detectors, etc) to achieve those objectives, in an effectively integrated system.

  20. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  1. Household food security status and associated factors among high-school students in Esfahan, Iran.

    Science.gov (United States)

    Mohammadzadeh, Assieh; Dorosty, Ahmadreza; Eshraghian, Mohammadreza

    2010-10-01

    The present study was designed to determine household food security status and factors associated with food insecurity among high-school students in Esfahan, Iran. Cross-sectional surveys. The present study was conducted in autumn 2008 in Esfahan, Iran. The samples were selected using systematic cluster sampling. Socio-economic questionnaires, food security questionnaires and FFQ were filled out during face-to-face interviews. In addition, data on participants' weights and heights were collected. A total of 580 students (261 boys and 319 girls) aged 14-17 years from forty high schools in Esfahan, Iran, were selected. The prevalence of household food insecurity according to the US Department of Agriculture food security questionnaire was 36.6 % (95 % CI 0.33, 0.40). Food insecurity was positively associated with number of members in the household (P hamburger, poultry, fish, green vegetables, root and bulb (coloured) vegetables, melons, apples and oranges, milk and yoghurt (P hamburger), whereas those living in food-insecure households more frequently consumed cheap foods containing high energy per kilogram. The present study suggests that intervention programmes be designed and carried out.

  2. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  3. Radon measurements in 130 schools

    International Nuclear Information System (INIS)

    Peake, R.T.; Schmidt, A.; MacWaters, J.T.; Chmelynski, H.

    1990-01-01

    During the winter of 1989, Rn screening measurements were made in 130 schools distributed across the United States. The primary purpose of the paper is to identify schools suitable for a year-long follow-up study, the results of which will be used to update EPA's guidance for Rn testing in schools. The 130 schools were selected nonrandomly using school characteristics and accessibility in areas where there were known or suspected Rn problems in homes. Levels found in this screening study may indicate the potential for Rn problems in US schools. Over half of the 130 schools tested had at least one radon measurement ≥4 pCi/L, and nearly 20% of the 3028 rooms measured ≥4 pCi/L. The number of rooms ≥4 pCi/L is often three rooms or less. However, schools with more than five rooms ≥4 pCi/L are common in some areas. The data include schools that could be typical of much of the US school population as well as schools which exhibit extreme radon problems, such as those tested in Nashville, TN and Spokane, WA

  4. Measuring emotion socialization in schools.

    Science.gov (United States)

    Horner, Christy G; Wallace, Tanner L

    2013-10-01

    Understanding how school personnel can best support students' development of communication skills around feelings is critical to long-term health outcomes. The measurement of emotion socialization in schools facilitates future research in this area; we review existing measures of emotion socialization to assess their applicability to school-based health studies. A content analysis of four emotion socialization measures was conducted. Inclusion criteria included: high frequency of use in prior research, established documentation of validity and reliability, and sufficient description of measurement procedures. Four dimensions emerged as particularly salient to a measure's future relevance and applicability to school-based health studies: (1) methods of measurement; (2) mode and agent of socialization; (3) type of emotion; and (4) structure versus function of socializing behavior. Future measurement strategies should address (1) the structures of emotion socializing processes; (2) diverse socializing agents such as teachers, peers, and administrators; (3) the intended functions of such processes; (4) student perceptions of and responses to such processes; and (5) the complex interactions of these factors across contexts. Strategies attending to these components will permit future studies of school-based emotion socializing processes to determine how they enhance health and reduce health risks. © 2013, American School Health Association.

  5. Security Situation in Secondary Schools in Tuzla Canton - BiH

    Directory of Open Access Journals (Sweden)

    Dzevad Mahmutovic

    2011-08-01

    Full Text Available In this research has been presented an assessment of safety situation in schools, examined through the attitudes of students and teachers of secondary schools in five municipalities of Tuzla Canton. The sample consisted of 160 subjects, who for the purposes of this research divided in three subsample: male students, female students and professors. The research was conducted as a questionnaire, where on the posted statements subjects chose one of five responses on the Likert-type scale. The results of the research showed that subjects generally have unfavour­able attitudes about security situation in secondary schools, which makes them feel very insecure. By descriptive analysis, besides these attitudes, it was determined that there are certain differences between the subsamples per individual variables. By analysis of variance, about influence of different status (student-professor on the sub-samples attitudes about safety in schools, it was determined that these differences were not statistically significant at the level p <.05 in results for the three subsample (F = .421, p = .245. In relation on manifested negative att­itudes about safety in schools, but also the homogeneity of results, in relation on the total sample of subjects, it is necessary to determine an adequate strategy of action, develop appropriate programs for work with students and make their prompt implementation in order to achieve safer living conditions and work in the school environment.

  6. Measuring Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Brochure provides and overview of the analysis and results. Readers interested in an in-depth discussion of methodology are referred to the MOSES Working Paper.

  7. Developing measures of food and nutrition security within an Australian context.

    Science.gov (United States)

    Archer, Claire; Gallegos, Danielle; McKechnie, Rebecca

    2017-10-01

    To develop a measure of food and nutrition security for use among an Australian population that measures all pillars of food security and to establish its content validity. The study consisted of two phases. Phase 1 involved focus groups with experts working in the area of food security. Data were assessed using content analysis and results informed the development of a draft tool. Phase 2 consisted of a series of three online surveys using the Delphi technique. Findings from each survey were used to establish content validity and progressively modify the tool until consensus was reached for all items. Australia. Phase 1 focus groups involved twenty-five experts working in the field of food security, who were attending the Dietitians Association of Australia National Conference, 2013. Phase 2 included twenty-five experts working in food security, who were recruited via email. Findings from Phase 1 supported the need for an Australian-specific tool and highlighted the failure of current tools to measure across all pillars of food security. Participants encouraged the inclusion of items to measure barriers to food acquisition and the previous single item to enable comparisons with previous data. Phase 2 findings informed the selection and modification of items for inclusion in the final tool. The results led to the development of a draft tool to measure food and nutrition security, and supported its content validity. Further research is needed to validate the tool among the Australian population and to establish inter- and intra-rater reliability.

  8. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability

    National Research Council Canada - National Science Library

    Hoaglund, Robert; Gazda, Walter

    2007-01-01

    The goal of this analysis is to provide ASCO and its customers with a comprehensive approach to the development of quantitative performance measures to assess security improvements to the port system...

  9. Enhancing China’s energy security: Determining influential factors and effective strategic measures

    International Nuclear Information System (INIS)

    Ren, Jingzheng; Sovacool, Benjamin K.

    2014-01-01

    Highlights: • The most influential factors affecting China’s energy security are identified. • Fuzzy AHP is used to quantify the importance of influential factors. • Strategic measures for enhancing China’s energy security are prioritized. • Fuzzy AHP is used to determine the priorities of the strategic measures. - Abstract: This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies and improving energy efficiency is the most salient, positive, and necessary strategic measure

  10. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.

    Science.gov (United States)

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung

    2012-06-01

    The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.

  11. Report of the international forum on nuclear energy, nuclear non-proliferation and nuclear security. Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Yamamura, Tsukasa; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2013-03-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Nuclear Energy, Nuclear Non-proliferation and Nuclear Security - Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia-' on 12 and 13 December 2012, co-hosted by the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo. In the forum, keynote speakers from Japan, International Atomic Energy Agency (IAEA), the U.S., France and Republic of Korea (ROK), respectively explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. In two panel discussions, entitled 'Measures to ensure nuclear non-proliferation and nuclear security of nuclear fuel cycle back end' and 'Measures to ensure nuclear non-proliferation and nuclear security for nuclear energy use in the Asian region and a multilateral cooperative framework', active discussions were made among panelists from Japan, IAEA, the U.S., France, ROK, Russia and Kazakhstan. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report except presentation materials. (author)

  12. ROLE OF GRASSROOTS ENVIRONMENTAL LITERACY: The case of water security at Bwaila Secondary School in Malawi

    Science.gov (United States)

    Chasukwa Mwalwenje, Yvonne; Chasukwa, Steria

    2015-04-01

    water. The main challenge is the degradation of water resources which result into siltation that blocks the water sources due to rain while in the dry season the water level in reservoirs goes down. Other challenges include inadequate service coverage, insufficient literacy on climate change, inadequate mitigation measures for water related disasters and inadequate promotion of hygiene and sanitation. Bwaila Secondary School in Malawi is no exception in experiencing inadequate water service coverage amidst opportunities such as availability of relatively abundant water resources, political will, active women and youth. The formal education curriculum in secondary schools has enriched students' knowledge of environmental management in subjects such as Geography, Agriculture and Biology to improve their understanding of natural resource management. However, the primary gap is that students do not use the skills in environmental management acquired from the formal school setting in their day to day life henceforth rendering it to be a mere academic exercise confined within classroom walls. It is against such background that Grassroots Environmental Literacy (GEL), an environmental management social marketing franchise in non-formal education was established to fill in the gap. GEL's mission is to inspire students to become change agents in environmental management in their own lives in both formal and non-formal settings in Malawi. GEL believes that the cultivation of broad-based private and public support is the key to bringing about positive and lasting environmental change hence contributing to water security. The education sector in general and school attendance in particular is largely affected by water security. Furthermore, technological limitations have also affected the accessibility of water resources. UNICEF (2008) asserts that water resources may be scarce as it is capital intensive to sink a bore hole in Malawi. Bwaila secondary school is one of the examples

  13. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-07-01

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients ( p  = 0.0001) and 50 of 97 reported inconvenience when traveling ( n  = 50 of 97 patients; p  = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  14. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    Science.gov (United States)

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648

  15. Obesity and food security in Yazd primary school students

    Directory of Open Access Journals (Sweden)

    Karam soltani Z

    2007-09-01

    Full Text Available Background: Food security is defined as access, for all people at all times, to enough food for an active and healthy life. Food security includes: 1 the ready availability of nutritionally-adequate and safe food, and 2 an assured ability to acquire acceptable foods in socially acceptable ways. The increase in childhood as well as adulthood obesity and food insecurity has caused many recent investigations on obesity, food insecurity and some associated factors. However, there appears to be a lack of published information regarding some factors affecting obesity and food insecurity. This study aimed to determine the prevalence obesity and food insecurity and some associated factors among Yazd province primary school students in Iran.Methods: Using two-stage cluster sampling, a total of 3245 students (1587 boys and 1658 girls, aged 9-11 years, were randomly selected from primary school pupils in Yazd, Iran. From these, 187 students having BMIs ≥95th percentile, as defined by Hosseini et al. (1999, were identified as obese and 187 pupils of the same age and gender having BMIs between the 15th and 85th percentiles were selected as controls. Data were collected using 24-hour food-recall and USDA food insecurity questionnaires.Results: We found that the prevalence of obesity among students aged 9-11 years was 13.3%, and the prevalence of food insecurity was 30.5%. Daily energy intakes, compared to those recommended by the RDA, carbohydrate intake and energy percentages from proteins and carbohydrates were higher in obese children, and all macronutrient intakes per kilogram of body weight were significantly higher. An association between obesity and food insecurity was observed with adjusted fat intake.Conclusion: In conclusion, the prevalence of obesity and food insecurity is high among Yazd primary school students, and high-level intakes of energy, protein, carbohydrate are associated with obesity. Furthermore, variation in the rate of fat intake

  16. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  17. Measuring the energy security implications of fossil fuel resource concentration

    International Nuclear Information System (INIS)

    Lefevre, Nicolas

    2010-01-01

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies-France and the United Kingdom-looking at the evolution of both indexes to 2030.

  18. Measuring the energy security implications of fossil fuel resource concentration

    Energy Technology Data Exchange (ETDEWEB)

    Lefevre, Nicolas [Woodrow Wilson School of Public and International Affairs, Princeton University, New Jersey (United States)

    2010-04-15

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies - France and the United Kingdom - looking at the evolution of both indexes to 2030. (author)

  19. Measuring School Climate: An Overview of Measurement Scales

    Science.gov (United States)

    Kohl, Diane; Recchia, Sophie; Steffgen, Georges

    2013-01-01

    Background: School climate is a heterogeneous concept with a multitude of standardised and validated instruments available to measure it. Purpose: This overview of measurement scales aims to provide researchers with short summaries of some of the self-report instruments in existence, especially in relation to the link between school climate and…

  20. Conceptualizing and measuring energy security: A synthesized approach

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Mukherjee, Ishani

    2011-01-01

    This article provides a synthesized, workable framework for analyzing national energy security policies and performance. Drawn from research interviews, survey results, a focused workshop, and an extensive literature review, this article proposes that energy security ought to be comprised of five dimensions related to availability, affordability, technology development, sustainability, and regulation. We then break these five dimensions down into 20 components related to security of supply and production, dependency, and diversification for availability; price stability, access and equity, decentralization, and low prices for affordability; innovation and research, safety and reliability, resilience, energy efficiency, and investment for technology development; land use, water, climate change, and air pollution for sustainability; and governance, trade, competition, and knowledge for sound regulation. Further still, our synthesis lists 320 simple indicators and 52 complex indicators that policymakers and scholars can use to analyze, measure, track, and compare national performance on energy security. The article concludes by offering implications for energy policy more broadly. -- Highlights: → Energy security should consist of five dimensions related to availability, affordability, technology development, sustainability, and regulation. → The dimensions of energy security can be broken down into 20 components. → These components can be distilled into 320 simple indicators and 52 complex indicators.

  1. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Science.gov (United States)

    2010-07-01

    ... stores and industrial supplies. (a) General. The OCS facility owner or operator must ensure that security...). These additional security measures may include: (1) Intensifying inspection of the stores or industrial... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for delivery of...

  2. Study on the concentration of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2002-01-01

    'Energy Security' concept has played the central role in Japan's energy policy. However, the definition of the concept is not clear. If energy security will remain a principal policy target, its concept should be clearly defined as a precondition. This dissertation analyzes historical changes in energy security concept and considers their relationship with the development of national security concept in international relations studies. Following an introduction in the first chapter, the second chapter reveals that energy security concept has changed in accord with energy situation and policymakers' concern of the times. As a result, several different definitions of the concept now coexist. The third chapter deals with the relationship between energy security concept and national security concepts in international relations. Three major definitions of energy security concepts correspond to definitions of security concepts by three schools in security theory - realism, liberalism, and globalism. In the fourth chapter, energy security is conceptualized and its policy measures are systematized by addressing the issues appeared in its historical changes and referring to security theory in international relations studies. The fifth chapter discusses the contribution by nuclear energy to Japan's energy security, applying a theoretical framework presented in previous chapters. Characteristics of nuclear energy which enhance energy security are identified, and policy measures for improving those characteristics are proposed. (author)

  3. Under Pressure: Job Security, Resource Allocation, and Productivity in Schools under No Child Left Behind

    OpenAIRE

    Randall Reback; Jonah Rockoff; Heather L. Schwartz

    2014-01-01

    We conduct the first nationwide study of incentives under the No Child Left Behind (NCLB) Act, which requires states to punish schools failing to meet target passing rates on students' standardized exams. States' idiosyncratic policies created variation in the risk of failure among very similar schools in different states, which we use to identify effects of accountability pressure. We find NCLB lowers teachers' perceptions of job security, shifts time towards specialist teachers in high-stak...

  4. Measuring Emotion Socialization in Schools

    Science.gov (United States)

    Horner, Christy G.; Wallace, Tanner L.

    2013-01-01

    Background: Understanding how school personnel can best support students' development of communication skills around feelings is critical to long-term health outcomes. The measurement of emotion socialization in schools facilitates future research in this area; we review existing measures of emotion socialization to assess their applicability…

  5. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    Full Text Available Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  6. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    Science.gov (United States)

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  7. Measuring food security in the Republic of Serbia

    Directory of Open Access Journals (Sweden)

    Papić-Brankov Tatjana

    2015-01-01

    Full Text Available The overall goal of this paper is analysis of Serbian food security system across a set of indicators, with special emphasis to 2012 Global Food Security Index (GFSI. The results generally provided two major weakness of the Serbian food system: Gross domestic product (GDP per capita based on purchasing power parity and Corruption. Paper points out the need to improve the current food security system and proposed a number of measures for its improvement. Among other things appropriate nutritional standards and strategies will have to be adopted; investors' confidence must be strengthened and must be dealt with in a serious fight against corruption in the agriculture and food sector. The development of rural areas, reducing regional disparities and stabilization of agricultural production will certainly contribute to the tough battle against poverty.

  8. Measurements of magnetic field sources in schools

    International Nuclear Information System (INIS)

    Johnson, G.B.

    1992-01-01

    The Electrical Systems Division of the Electric Power Research Institute (EPRI) has initiated several research projects to investigate magnetic field levels, their characteristics, and their sources. This paper describes measurements of magnetic field sources in schools. Magnetic field measurements were made at four schools in the service areas of two utility companies. Magnetic field measurements included profiles of the magnetic field versus distance near power lines, around the perimeter of the school buildings, and at several locations within each school. Twenty-four hour measurements were also made to record the temporal variation of the magnetic field at several locations at each school. The instrumentation, measurement techniques, and magnetic field sources identified are discussed

  9. The association of family food security and depression in mothers having primary school children in Ray-Iran.

    Science.gov (United States)

    Payab, Moloud; Motlagh, Ahmad-Reza Dorosty; Eshraghian, Mohammadreza; Rostami, Reza; Siassi, Fereydoun

    2014-01-01

    As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group.

  10. Internal Interface Diversification as a Security Measure in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sampsa Rauti

    2018-03-01

    Full Text Available More actuator and sensor devices are connected to the Internet of Things (IoT every day, and the network keeps growing, while software security of the devices is often incomplete. Sensor networks and the IoT in general currently cover a large number of devices with an identical internal interface structure. By diversifying the internal interfaces, the interfaces on each node of the network are made unique, and it is possible to break the software monoculture of easily exploitable identical systems. This paper proposes internal interface diversification as a security measure for sensor networks. We conduct a study on diversifiable internal interfaces in 20 IoT operating systems. We also present two proof-of-concept implementations and perform experiments to gauge the feasibility in the IoT environment. Internal interface diversification has practical limitations, and not all IoT operating systems have that many diversifiable interfaces. However, because of low resource requirements, compatibility with other security measures and wide applicability to several interfaces, we believe internal interface diversification is a promising and effective approach for securing nodes in sensor networks.

  11. Measurable Control System Security through Ideal Driven Technical Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based

  12. Enhancing China’s Energy Security: Determining Influential Factors and Effective Strategic Measures

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Sovacool, Benjamin

    2014-01-01

    This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used...... to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies...

  13. A Secure System Architecture for Measuring Instruments in Legal Metrology

    Directory of Open Access Journals (Sweden)

    Daniel Peters

    2015-03-01

    Full Text Available Embedded systems show the tendency of becoming more and more connected. This fact combined with the trend towards the Internet of Things, from which measuring instruments are not immune (e.g., smart meters, lets one assume that security in measuring instruments will inevitably play an important role soon. Additionally, measuring instruments have adopted general-purpose operating systems to offer the user a broader functionality that is not necessarily restricted towards measurement alone. In this paper, a flexible software system architecture is presented that addresses these challenges within the framework of essential requirements laid down in the Measuring Instruments Directive of the European Union. This system architecture tries to eliminate the risks general-purpose operating systems have by wrapping them, together with dedicated applications, in secure sandboxes, while supervising the communication between the essential parts and the outside world.

  14. A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses

    Directory of Open Access Journals (Sweden)

    Agata McCormac

    2017-11-01

    Full Text Available The Human Aspects of Information Security Questionnaire (HAIS-Q is designed to measure Information Security Awareness. More specifically, the tool measures an individual’s knowledge, attitude, and self-reported behaviour relating to information security in the workplace. This paper reports on the reliability of the HAIS-Q, including test-retest reliability and internal consistency. The paper also assesses the reliability of three preliminary over-claiming items, designed specifically to complement the HAIS-Q, and identify those individuals who provide socially desirable responses. A total of 197 working Australians completed two iterations of the HAIS-Q and the over-claiming items, approximately 4 weeks apart. Results of the analysis showed that the HAIS-Q was externally reliable and internally consistent. Therefore, the HAIS-Q can be used to reliably measure information security awareness. Reliability testing on the preliminary over-claiming items was not as robust and further development is required and recommended. The implications of these findings mean that organisations can confidently use the HAIS-Q to not only measure the current state of employee information security awareness within their organisation, but they can also measure the effectiveness and impacts of training interventions, information security awareness programs and campaigns. The influence of cultural changes and the effect of security incidents can also be assessed.

  15. The Tripod School Climate Index: An Invariant Measure of School Safety and Relationships.

    Science.gov (United States)

    Phillips, Sarah Fierberg; Rowley, Jacob F S

    2016-03-01

    Recently revised standards for social work practice in schools encourage data-informed school climate interventions that implicitly require invariant measures of school climate. Invariant measures have the same meaning, scale, and origin across different groups of respondents. Although noninvariant measures bias statistical analyses and can lead users to erroneous conclusions, most school climate measures have not been tested for invariance. This study examines the invariance of the Tripod School Climate Index. Exploratory, confirmatory, and multiple-group confirmatory factor analyses were conducted on data collected from 66,531 students across 222 schools. Results indicate that the index is an excellent fit for the data and invariant by student grade level, demographic background, prior achievement, and dropout risk. Results imply that student responses can be validly aggregated to create school-level scores. The index will not bias studies of school climate interventions or bivariate analyses comparing perceptions of school climate across subgroups of students attending the same school. Given the centrality of school climate interventions to social work practice in schools and the consequences of noninvariance, the development of an index with these properties is an important contribution to the field.

  16. English Value-Added Measures: Examining the Limitations of School Performance Measurement

    Science.gov (United States)

    Perry, Thomas

    2016-01-01

    Value-added "Progress" measures are to be introduced for all English schools in 2016 as "headline" measures of school performance. This move comes despite research highlighting high levels of instability in value-added measures and concerns about the omission of contextual variables in the planned measure. This article studies…

  17. A Security Risk Measurement for the RAdAC Model

    National Research Council Canada - National Science Library

    Britton, David W; Brown, Ian A

    2007-01-01

    .... The intent is to quantify the risk involved in a single information transaction. Additionally, this thesis will attempt to identify the risk factors involved when calculating the total security risk measurement...

  18. Schools and Safety: Waiting for When

    Science.gov (United States)

    Ruder, Robert

    2012-01-01

    In response to violence against students and school personnel in the past decade, school districts have implemented an array of security measures designed to keep all the occupants of a school free from harm. Despite these safeguards, personnel continue to operate under the assumption that it's not a question of "if," it's a question of "when."…

  19. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  20. Impacts of security dimensions on awareness measurement in ...

    African Journals Online (AJOL)

    A big challenge facing Social Networks (SNs) and other organisations has been what to measure when determining the adequacy and effectiveness of awareness programmes. This study defines security dimension as Knowledge, Attitude and Behaviour, and identifies them as the main influencing factors to consider in ...

  1. Protecting Our Future--Developing a National School Security Standard

    Science.gov (United States)

    2013-12-01

    Safety Policy (Washington, DC: Congressional Research Service, 2013). 9 alienation, rumination on...The First of All Fears. Shoemaker contends the likelihood of a terrorist attack on an American school is minimal. He concludes that risk management...but also deftly explain why the targeting of schools by terrorists are rare events and therefore require measured responses.43 They contend that

  2. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide

    International Nuclear Information System (INIS)

    2012-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  3. Measures for regional security and arms control in the South-East Asian area

    International Nuclear Information System (INIS)

    Uren, R.T.

    1992-01-01

    The subject of regional security and arms control in the South-East Asia raises some new and difficult issues. No approach to ensuring regional security could be complete without military dimension including the following categories: regional arms control; global arms control measure; confidence building measures that are designed to enhance the transparency of defense policies; confidence building measures that encourage cooperation among the military forces in the region

  4. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2017-01-01

    This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.

  5. Towards improving security measures in Nigeria University Libraries ...

    African Journals Online (AJOL)

    A questionnaire designed by the researchers titled “Towards Improving Security Measures in Nigerian University Libraries (TISMINUL)” was used to collect the needed data. The questionnaire was designed in two parts. Part one was to gather information on the size of collection, frequency of stock taking and book loss.

  6. ORGANIZATION OF ACTIVITIES IN THE COMPUTER LAB AT THE SECONDARY EDUCATIONAL ESTABLISHMENTS IN VIEW OF MEASURES OF INFORMATION SECURITY.

    Directory of Open Access Journals (Sweden)

    V.N. Kovalchuk

    2010-11-01

    Full Text Available The paper the organizational activities of informational security in the secondary school are considered In particular the planning of organizational activities on stages of the lifecycle of the system of information security of educational computer complex is proposed. There are purified the methods of unification for the software installed at the pupils’ workstations. There is developed the tentative calendar plan of regular activities and main approaches to the management of system of informational security of educational computer complex on the basis of hardware-software level and the organization of antivirus security in computer lab is described.

  7. Development and initial validation of a measure of attachment security in late adulthood.

    Science.gov (United States)

    Lopez, Frederick G; Ramos, Katherine; Kim, Mijin

    2018-05-10

    Attachment theory-guided studies of older adults have generally relied on self-report measures that were validated on young adult samples and that focus on fears of rejection by romantic partners and on experiences of chronic discomfort with romantic intimacy as the key indicators of adult attachment security. These assessment characteristics raise important questions as to whether these measures are appropriate for use with older adults. Unlike their younger adult counterparts, older adults may face distinctive life stage-related threats to their attachment security such as declining health and autonomy, spousal loss, and increased dependence on younger family members for instrumental and emotional support. In response to these concerns, we conducted two independent studies aimed at developing and validating a novel measure of attachment security in older adults-the Late Adulthood Attachment Scale (LAAS). In study one (N = 287), exploratory structural equation modeling (ESEM) methods were used to identify and support a 2-factor structure (Fearful Avoidance, Secure Engagement) underlying LAAS scores. In study two (N = 417), ESEM and regression analyses confirmed the 2-factor structure and demonstrated the ability of LAAS scores to predict participants' well-being over a 3-month interval (n = 93). Findings from both studies support the psychometric adequacy of the LAAS as an alternative measure of attachment security for use with older adult samples. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  8. Implementing Network Video for Traditional Security and Innovative Applications: Best Practices and Uses for Network Video in K-12 Schools

    Science.gov (United States)

    Wren, Andrew

    2008-01-01

    Administrators are constantly seeking ways to cost-effectively and adequately increase security and improve efficiency in K-12 schools. While video is not a new tool to schools, the shift from analog to network technology has increased the accessibility and usability in a variety of applications. Properly installed and used, video is a powerful…

  9. The strategic measures for the industrial security of small and medium business.

    Science.gov (United States)

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  10. The Strategic Measures for the Industrial Security of Small and Medium Business

    Directory of Open Access Journals (Sweden)

    Chang-Moo Lee

    2014-01-01

    Full Text Available The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business, furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  11. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  12. Measuring school climate in high schools: a focus on safety, engagement, and the environment.

    Science.gov (United States)

    Bradshaw, Catherine P; Waasdorp, Tracy E; Debnam, Katrina J; Johnson, Sarah Lindstrom

    2014-09-01

    School climate has been linked to multiple student behavioral, academic, health, and social-emotional outcomes. The US Department of Education (USDOE) developed a 3-factor model of school climate comprised of safety, engagement, and environment. This article examines the factor structure and measurement invariance of the USDOE model. Drawing upon 2 consecutive waves of data from over 25,000 high school students (46% minority), a series of exploratory and confirmatory factor analyses examined the fit of the Maryland Safe and Supportive Schools Climate Survey with the USDOE model. The results indicated adequate model fit with the theorized 3-factor model of school climate, which included 13 subdomains: safety (perceived safety, bullying and aggression, and drug use); engagement (connection to teachers, student connectedness, academic engagement, school connectedness, equity, and parent engagement); environment (rules and consequences, physical comfort, and support, disorder). We also found consistent measurement invariance with regard to student sex, grade level, and ethnicity. School-level interclass correlation coefficients ranged from 0.04 to .10 for the scales. Findings supported the USDOE 3-factor model of school climate and suggest measurement invariance and high internal consistency of the 3 scales and 13 subdomains. These results suggest the 56-item measure may be a potentially efficient, yet comprehensive measure of school climate. © 2014, American School Health Association.

  13. 78 FR 9768 - Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures...

    Science.gov (United States)

    2013-02-11

    ... DEPARTMENT OF STATE [Public Notice 8184] Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures Against Foreign Persons, Including a Ban on U.S. Government Procurement AGENCY: Bureau of International Security and Nonproliferation, Department of State. ACTION: Notice...

  14. Wide Area Measurement Based Security Assessment & Monitoring of Modern Power System: A Danish Power System Case Study

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Chen, Zhe; Thøgersen, Paul

    2013-01-01

    Power System security has become a major concern across the global power system community. This paper presents wide area measurement system (WAMS) based security assessment and monitoring of modern power system. A new three dimensional security index (TDSI) has been proposed for online security...... monitoring of modern power system with large scale renewable energy penetration. Phasor measurement unit (PMU) based WAMS has been implemented in western Danish Power System to realize online security monitoring and assessment in power system control center. The proposed security monitoring system has been...

  15. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2006-01-01

    ... of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, strengthening economic activity, and achieving a stable security environment in Iraq...

  16. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2005-01-01

    .... The initial section of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, economic progress, and achieving a stable security environment in Iraq...

  17. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  18. Quantifying, Measuring, and Strategizing Energy Security: Determining the Most Meaningful Dimensions and Metrics

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Sovacool, Benjamin

    2014-01-01

    subjective concepts of energy security into more objective criteria, to investigate the cause-effect relationships among these different metrics, and to provide some recommendations for the stakeholders to draft efficacious measures for enhancing energy security. To accomplish this feat, the study utilizes...

  19. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  20. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  1. 78 FR 9769 - Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures on...

    Science.gov (United States)

    2013-02-11

    ... DEPARTMENT OF STATE [Public Notice 8182] Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures on Chinese and Iranian Foreign Persons AGENCY: Bureau of International Security and Nonproliferation, Department of State. ACTION: Notice. SUMMARY: The U.S. Government...

  2. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    Energy Technology Data Exchange (ETDEWEB)

    Birch, Gabriel Carisle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Griffin, John Clark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenarios are presented with calculations showing the application of such a metric.

  3. Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

    International Nuclear Information System (INIS)

    McKague, Matthew

    2009-01-01

    Device independent quantum key distribution (QKD) aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used. The previous proof of security by Pironio et al (2009 New J. Phys. 11 045021) applies only to collective attacks where the state is identical and independent and the measurement devices operate identically for each trial in the protocol. We extend this result to a more general class of attacks where the state is arbitrary and the measurement devices have no memory. We accomplish this by a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qubit strategies based on the previous proof by Pironio et al and techniques adapted from Renner.

  4. The School Assessment for Environmental Typology (SAfETy): An Observational Measure of the School Environment.

    Science.gov (United States)

    Bradshaw, Catherine P; Milam, Adam J; Furr-Holden, C Debra M; Johnson, Sarah Lindstrom

    2015-12-01

    School safety is of great concern for prevention researchers, school officials, parents, and students, yet there are a dearth of assessments that have operationalized school safety from an organizational framework using objective tools and measures. Such a tool would be important for deriving unbiased assessments of the school environment, which in turn could be used as an evaluative tool for school violence prevention efforts. The current paper presents a framework for conceptualizing school safety consistent with Crime Prevention through Environmental Design (CPTED) model and social disorganization theory, both of which highlight the importance of context as a driver for adolescents' risk for involvement in substance use and violence. This paper describes the development of a novel observational measure, called the School Assessment for Environmental Typology (SAfETy), which applies CPTED and social disorganizational frameworks to schools to measure eight indicators of school physical and social environment (i.e., disorder, trash, graffiti/vandalism, appearance, illumination, surveillance, ownership, and positive behavioral expectations). Drawing upon data from 58 high schools, we provide preliminary data regarding the validity and reliability of the SAfETy and describe patterns of the school safety indicators. Findings demonstrate the reliability and validity of the SAfETy and are discussed with regard to the prevention of violence in schools.

  5. Measuring School Psychology Trainee Self-Efficacy

    Science.gov (United States)

    Lockwood, Adam B.; Mcclure, John; Sealander, Karen; Baker, Courtney N.

    2017-01-01

    There is an ever-increasing need for school psychology training programs to demonstrate their ability to produce competent practitioners. One method of addressing this need is through the assessment of self-efficacy. However, little research on self-efficacy in school psychology exists likely due to the lack of a psychometrically sound measure of…

  6. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (Russian Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  7. Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports

    Science.gov (United States)

    2013-03-01

    general management, public administration, and performance measurement principles. The main objective is to discover patterns or trends in the writings ...security programs. Some of the writing is critical of administrative policy before and after 9/11, and takes exception to an apparent lack of unity...measurement tools. The diverse group should not be turned loose to freelance ; but should be held accountable with formal direction, based on stakeholder

  8. FOLLOW-UP RADON MEASUREMENTS IN 14 MITIGATED SCHOOLS

    Science.gov (United States)

    The report gives results of a determination of the long-term performance of radon mitigation systems installed in U. S. EPA research schools: radon measurements were conducted in 14 schools that had been mitigated between 1988 and 1991. The measurements were made between Februar...

  9. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  10. [Are the flight security measures good for the patients? The "sickurity" problem].

    Science.gov (United States)

    Felkai, Péter

    2010-10-10

    Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".

  11. New Hampshire Public Schools Facilities Adequacy and Condition Study Report.

    Science.gov (United States)

    2000

    This report presents New Hampshire survey data, methodology, and the survey instrument used to measure a school's physical quality and educational effectiveness. The survey instrument collects data in the following categories: school site; building; building systems; building maintenance; building safety and security; space adequacy; and building…

  12. Security, Extremism and Education: Safeguarding or Surveillance?

    Science.gov (United States)

    Davies, Lynn

    2016-01-01

    This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…

  13. Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask

    Directory of Open Access Journals (Sweden)

    Alex Caro

    2016-04-01

    Full Text Available This article is based on an independent cyber security risk management audit for a public library system completed by the authors in early 2015 and based on a research paper by the same group at Clark University in 2014. We stress that while cyber security must include raising public knowledge in regard to cyber security issues and resources, and libraries are indeed the perfect place to disseminate this knowledge, librarians are also in a unique position as the gatekeepers of information services provided to the public and should conduct internal audits to ensure our content partners and IT vendors take cyber security as seriously as the library and its staff. One way to do this is through periodic reviews of existing vendor relationships. To this end, the authors created a simple grading rubric you can adopt or modify to help take this first step towards securing your library data. It is intended to be used by both technical and non-technical staff as a simple measurement of what vendor agreements currently exist and how they rank, while at the same time providing a roadmap for which security features or policy statements the library can or should require moving forward.

  14. Violence in American Schools: The Impact of the Newtown School Shooting on School Practices and Programs, School Security Staff, Staff Training, and Security Budgets

    Science.gov (United States)

    O'Donnell, Robert William

    2016-01-01

    The purpose of this study was to examine changes implemented by public school district personnel in response to the Newtown school shooting that occurred on December 14, 2012. The researcher used the U.S. Department of Education's National Center for Educational Statistics (NCES) School Survey on Crime and Safety (SSOCS) to gather quantitative…

  15. Long-term energy services security: What is it and how can it be measured and valued?

    International Nuclear Information System (INIS)

    Jansen, Jaap C.; Seebregts, Ad J.

    2010-01-01

    The paper reviews some recent approaches towards measuring the extent of long-term energy security and security externality valuation. It starts out to discuss the contextual connotations of notions of 'energy security' in medium to long-term time frames and reviews some indicators that have been proposed to quantify it. Special attention is paid to two of these approaches, which the authors helped to develop, i.e. diversity-based indices and the Supply/Demand Index. The paper takes issue with conventional welfare economic approaches that neglect: (i) the scope on the demand side for raising security and (ii) negative feedback mechanisms of socio-political impacts of international rent transfers in fossil fuels exporting countries. The concept of energy services security is proposed with a demand-side focus. This enables application of an integrated approach to gauge the resilience of a society to meet the needs of its population for energy services over longer timescales ahead from various interrelated perspectives. Propositions are made on the attribution of security externalities to the use of fossil fuels, policies, and suggestions for further improvements of measures for energy services security.

  16. Enhancing QKD security with weak measurements

    Science.gov (United States)

    Farinholt, Jacob M.; Troupe, James E.

    2016-10-01

    Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.

  17. Performance Measurement using KPKU- BUMN in X School Education Foundation

    Science.gov (United States)

    Arijanto, Sugih; Harsono, Ambar; Taroepratjeka, Harsono

    2016-01-01

    The purpose of this research is to determine X School's Strengths and Opportunity of Improvement through performance measurement using KPKU-BUMN (Kriteria Penilaian Kinerja Unggul - Kementerian Badan Usaha Milik Negara). KPKU-BUMN is developed based on Malcolm Baldrige Criteria for Performance Excellent (MBCfPE). X school is an education foundation at Bandung that has provides education from kindergarten, elementary school, to junior and senior high school. The measurement is implemented by two aspects, Process and Result. The Process is measured by A-D-L-I approaches (Approach- Deployment-Learning- Integration), on the other hand The Result is measured by Le-T-C-I approach (Level-Trend- Comparison-Integration). There are six processes that will be measured: (1) Leadership, (2) Strategic Planning, (3) Customer Focus, (4) Measurement, Analysis and Knowledge Management, (5) Work Force Focus, and (6) Operation Focus. Meanwhile, the result are (a) product & process outcomes, (b) customer-focused outcomes, (c) workforce-focused outcomes, (d) leadership & governance outcomes, and (e) financial & market outcomes. The overall score for X School is 284/1000, which means X School is at “early result” level at “poor” global image.

  18. The National Security Strategy of the United Kingdom: Security in an Interdependent World

    Science.gov (United States)

    2008-03-01

    security architecture has yet to adapt satisfactorily to the new landscape. The UN Security Council has failed to adapt to the rise of new powers. Across...including cinemas , theatres, pubs, nightclubs, restaurants, hotels and commercial centres, hospitals, schools and places of worship); work with architects...and export control regimes, and improving the international monitoring architecture . Countering the threat of nuclear weapons and other weapons of

  19. Challenges to regional security and disarmament measures

    International Nuclear Information System (INIS)

    Clements, K.P.

    1993-01-01

    The new agenda for peace is providing an extremely useful road map for current international and regional discussions about new ways and means of securing and maintaining peace and security. It underlines the central role of the United nations Security Council in relation to international conflicts and the maintenance of the peace, but it underlines an increasingly important role of the regional organisations as well. In all, there is a recognition that the end of the cold war has generated possibilities for peace-building that have not existed before. To take advantage of these opportunities requires an enhancement of consultation and dialogue at national, regional and global levels so that all nations and all peoples feel and know that they have a stake in the new peace and security architecture that will govern international relations into the twenty first century

  20. Emotional Security in the Classroom: What Works for Young Children

    Science.gov (United States)

    Janson, Gregory R.; King, Margaret A.

    2006-01-01

    Discussions regarding young children and secure schools often focus on children's physical safety and external stressors such as chaotic families, dangerous neighborhoods, and terrorism. Less attention is given to the emotional security of children in schools, a necessary prerequisite to learning and healthy development. The most effective way to…

  1. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION

  2. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company

    OpenAIRE

    Qureshi, Muhammad Sohail

    2012-01-01

    Nowadays information security policies are operative in many organizations. Currently few organizations take the pain of verifying the efficacy of these policies. Different standards and procedures exist about methods of measuring efficacy of information security policies. Choosing and implementing them depends mainly on the key performance indicators (KPIs) and key risk indicators (KRIs) of any particular organization. This thesis is a case study of an organization in United Arab Emirates (U...

  3. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  4. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    as these have already been used successfully in school attacks such as those used in the Columbine massacre . Aum Shinrikyo, now known as Aleph, 36...terrorist siege. Equally disturbing was the school massacre in "Netiv Meir," an elementary school in Ma’a lot, Israel, on May 15, 1974, the twenty-sixth...Immediate Consumer The immediate consumer will be School District 207, which is comprised of three large high schools with a combined student enrollment

  5. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  6. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  7. The Profile of a School and Measurement of a Multi-School Organization Change Program.

    Science.gov (United States)

    Feitler, Fred C.

    Modern organization theory and research from business and industry predicts that schools which change toward the Likert participative group organizations will increase productivity. This paper reports interventions of a one-year organization development program carried out with 12 schools and the change results measured by the Profile of a School.…

  8. National Security in the Nuclear Age. A Conference for State Social Studies Coordinators on Pre-Collegiate National Security Education (Washington, DC, June 26-July 1, 1983).

    Science.gov (United States)

    Trout, B. Thomas; And Others

    This conference report addresses education on national security and international relations in secondary school courses in the social studies. Main conclusions of the conference are: (1) Topics on national security should be added to the secondary school curriculum. (2) Current institutional and instructional settings are open to inclusion of…

  9. Certified Schools

    Data.gov (United States)

    Department of Homeland Security — Certified schools must provide specific information regarding the school, the nature and requirements of the educational program, location and contact information,...

  10. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  11. Bio-security measures employed by poultry farmers in Enugu State ...

    African Journals Online (AJOL)

    Major bio-security measures used by farmers include: inspection of flock daily to pick mortalities (x̄ =3.7), isolation and quarantine of sick birds (x̄ =3.7), vaccination of birds (x̄ =3.6), as well as adequate cleaning of feeding and drinking troughs (x̄ =3.6). The standardized coefficients for age (0.327), farming experience ...

  12. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  13. Measuring the security of external energy supply in the European Union

    DEFF Research Database (Denmark)

    Le Coq, Chloe; Paltseva, Elena

    2009-01-01

    The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political...

  14. [Case study: school meals' management in Santiago de Cali and Bogota].

    Science.gov (United States)

    Díaz, Mónica del Pilar; Montoya, Iván A; Montoya, Luz A

    2011-10-01

    This research was aimed at ascertaining the state's role regarding hunger and how it manages to combat this matter; a food security program in two Colombian cities was thus assessed (i.e. school meals' provision in Cali and Bogota). A qualitative approach was adopted; documentary analysis, participant observation and in-depth interviews with various actors for both selected cases were used as data collection techniques. It was found that several measures taken in this area were not covered by regulatory principles aimed at covering all the dimensions of food security. Serious weaknesses in school meals' management in Cali were associated with a weak environment regarding the fight against hunger. School meals' management in Bogotá was aimed at recognizing the right to food as being supported by an institutional process where the issue of reducing hunger has become a firm purpose. School meals' program management was associated with the characteristics of its product, thereby affecting the program and the population's food and nutritional status; state management thus becomes another dimension of food security.

  15. Measuring Global Water Security Towards Sustainable Development Goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  16. Door locking and exit security measures on acute psychiatric admission wards

    NARCIS (Netherlands)

    Nijman, H.L.I.; Bowers, L.; Haglund, K.; Muir-Cochrane, E.; Simpson, A.; Merwe, M. van der

    2011-01-01

    Locking the exit doors of psychiatric wards is believed to reduce the risk of patients absconding. The aims of the study were to investigate both the prevalence of door locking and other exit security measures on UK admission wards, as well as whether door locking appears to be effective in keeping

  17. The Evaluation of Teachers’ Security at School

    Directory of Open Access Journals (Sweden)

    Valdas Pruskus

    2011-06-01

    Full Text Available In modern society teachers experience a significant increase in psychological as well as physical violence of pupils, which, consequently, aggravates the overall educational process and demotivates teachers to carry out their duties properly. On the basis of the research carried out, the article analyses feelings of teachers working in schools of different types and their reaction to experienced insecurity. It is shown that the manifestation of teachers’ insecurity experienced at schools of different types is different: teachers of primary schools suffer from economic insecurity the most, teachers of basic schools suffer from economic and psychological insecurity, and teachers of secondary schools and gymnasiums suffer from psychological insecurity.

  18. Private Schools

    Data.gov (United States)

    Department of Homeland Security — This Private Schools feature dataset is composed of all Private elementary and secondary education features in the United States as defined by the Private School...

  19. Measurement invariance of an instrument assessing sustainability of school-based universal behavior practices.

    Science.gov (United States)

    Mercer, Sterett H; McIntosh, Kent; Strickland-Cohen, M Kathleen; Horner, Robert H

    2014-06-01

    The purpose of the study was to examine the extent to which the School-Wide Universal Behavior Sustainability Index: School Teams (SUBSIST; McIntosh, Doolittle, Vincent, Horner, & Ervin, 2009), a measure of school and district contextual factors that promote the sustainability of school practices, demonstrated measurement invariance across groups of schools that differed in length of time implementing school-wide Positive Behavioral Interventions and Supports (PBIS; Sugai & Horner, 2009), student ethnic composition, and student socioeconomic status (SES). School PBIS team members and district coaches representing 860 schools in 14 U.S. states completed the SUBSIST. Findings supported strong measurement invariance, for all items except 1, of a model with two school-level factors (School Priority and Team Use of Data) and 2 district-level factors (District Priority and Capacity Building) across groups of schools at initial implementation, institutionalization, and sustainability phases of PBIS implementation. Schools in the sustainability phase were rated significantly higher on School Priority and Team Use of Data than schools in initial implementation. Strong measurement invariance held across groups of schools that differed in student ethnicity and SES. The findings regarding measurement invariance are important for future longitudinal investigations of factors that may promote the sustained implementation of school practices. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  20. Statistics & Input-Output Measures for School Libraries in Colorado, 2002.

    Science.gov (United States)

    Colorado State Library, Denver.

    This document presents statistics and input-output measures for K-12 school libraries in Colorado for 2002. Data are presented by type and size of school, i.e., high schools (six categories ranging from 2,000 and over to under 300), junior high/middle schools (five categories ranging from 1,000-1,999 to under 300), elementary schools (four…

  1. A Review and Analysis of Selected School Climate Measures

    Science.gov (United States)

    Olsen, Jacob; Preston, Angela I.; Algozzine, Bob; Algozzine, Kate; Cusumano, Dale

    2018-01-01

    Although it is widely agreed that there is no universally accepted definition for school climate, most professionals ground it in shared beliefs, values, and attitudes reflecting the quality and character of life in schools. In this article, we review and analyze measures accessible to school personnel charged with documenting and monitoring…

  2. Radon in schools. An elevation measurement in schools in Baden-Wuerttemberg

    International Nuclear Information System (INIS)

    Fesenbeck, I.; Naber, C.; Frank, G.; Wilhelm, C.; Schaller, M.

    2016-01-01

    With an effective dose of about 1.1 mSv per year, radon and its secondary products have the biggest share in the population's natural radiation exposure. For implementation of the new EU directive 2013/59/EURATOM dated January 17, 2014, it is now planned to adapt the limit values of the Radiation Protection Ordinance and to extend the scope of validity in the EU member states. The ''Radon at Schools'' project is to cover an area-wide survey of radon concentrations in room air of schools in Baden-Wuerttemberg. Potential hazards caused by radon-222 and secondary products of radon are to be studied. For the project, 1600 schools were selected and requested to participate by an information letter. Half of the schools is distributed over the entire area of Baden-Wuerttemberg. The other half is located in areas of increased radon potential. Radon concentration in room air is determined passively by Karlsruhe radon exposimeters. Subsequently, active radon measurements will be made at conspicuous schools and information events will be offered for municipalities, teachers, interested parents, and pupils.

  3. Perceived Safety at Work in the Wake of Terror: The Importance of Security Measures and Emergency Preparedness.

    Science.gov (United States)

    Nissen, Alexander; Heir, Trond

    2016-12-01

    We aimed to explore how perceived safety after terrorism is connected to views on security measures and emergency preparedness in a workplace setting. Using a questionnaire-based, cross-sectional study of ministerial employees in Norway who were targeted in a terrorist attack in 2011 (n=3344), we investigated how employees' perceived safety at work 9 to 10 months after the attack was associated with their perceptions of whether security measures were sufficiently prioritized at work, whether there had been sufficient escape and evacuation training, and whether they were confident with evacuation procedures. We found strong evidence of increasing perceived safety at work the more employees believed security measures were sufficiently prioritized at work (partially confounded by post-traumatic stress disorder), and the better their knowledge of evacuation procedures (modified by gender and education). The present study suggests that employers may enhance perceived safety at work for terror-exposed employees by showing a commitment to security measures and by ensuring employees know evacuation procedures well. More research is needed to investigate causality patterns behind the associations found in this cross-sectional study. (Disaster Med Public Health Preparedness. 2016;10:805-811).

  4. Friendship Security, But Not Friendship Intimacy, Moderates the Stability of Anxiety During Preadolescence.

    Science.gov (United States)

    Wood, Megan A; Bukowski, William M; Santo, Jonathan B

    2017-01-01

    A two-wave longitudinal study of 380 preadolescents (M age = 10.87) from largely middle-class schools in Montréal, Québec, Canada, assessed the hypothesis that friendship security, but not friendship intimacy, moderates the stability of anxiety during adolescence. This central but largely overlooked question about peer relations concerns which aspects of friendship account for the effects of friendship on emotional adjustment. Anxiety and friendship quality were measured via self-report questionnaires, employing the Network of Relationships Inventory for security and intimacy items. An index of friendship durability, which combined reciprocity and stability within first- and second-best friendship choices, was derived from sociometric measures. A latent variable path analysis examined with structural equation modeling showed that anxiety was less stable for children who perceived their friendships as secure. The moderating effect of intimacy was statistically nonsignificant. A follow-up analysis showed that the effects of security did not result from friendship durability. These findings provide support for the long-standing but previously unaddressed hypothesis that security, rather than intimacy, accounts for friendship's effect on anxiety reduction during early adolescence.

  5. Measuring energy security. Can the United States achieve oil independence?

    International Nuclear Information System (INIS)

    Greene, David L.

    2010-01-01

    Stochastic simulation of the direct economic costs of oil dependence in an uncertain future is proposed as a useful metric of oil dependence. The market failure from which these costs arise is imperfect competition in the world oil market, chiefly as a consequence of the use of market power by the Organization of the Petroleum Exporting Countries (OPEC) cartel. Oil dependence costs can be substantial. It is estimated that oil dependence costs to the US economy in 2008 will exceed $500 billion. Other costs, such as military expenditures or foreign policy constraints are deemed to be largely derivative of the actual or potential economic costs of oil dependence. The use of quantifiable economic costs as a security metric leads to a measurable definition of oil independence, or oil security, which can be used to test the ability of specific policies to achieve oil independence in an uncertain future. (author)

  6. Security of Energy Supply - Indicators for Measuring Vulnerability and Risk

    International Nuclear Information System (INIS)

    Heinrich, C.

    2010-01-01

    In an era of increasing globalization, secure and affordable energy supplies are an essential requirement for economies to work, much less develop and grow in the long term. The present study, Energy security of supply - indicators for measuring vulnerability and risk, develops a broad methodical assessment concept to raise awareness among policy makers and the public regarding the vulnerability of energy supplies to potential energy crises. It explores the different aspects of vulnerability, from the primary energy level to energy infrastructure (storage, networks, power plant parks) to the efficiency and cost of energy consumption for end users. The individual characteristics of the formal concept were quantitatively evaluated for several OECD regions (Germany, UK, Sweden, Poland, Italy, France and the US) using a comprehensive empirical database and reduced to a single indicator for assessing energy supply vulnerability. Part of the database comprises historical observations for the period between 1978 and 2007.(author).

  7. Curriculum for Security in a Nuclear Age.

    Science.gov (United States)

    Carlson, Helen L.

    1984-01-01

    A survey of secondary students after they had completed a course entitled "Security in the Nuclear Age" suggests that instruction can make some impact in the area of security information. However, results also showed that students use media rather than school as information sources. Peace curricula are also discussed. (RM)

  8. Molecules for security measures: from keypad locks to advanced communication protocols.

    Science.gov (United States)

    Andréasson, J; Pischel, U

    2018-04-03

    The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.

  9. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  10. School and Pupil Effects on Secondary Pupils' Feelings of Safety in School, around School, and at Home

    Science.gov (United States)

    Mooij, Ton; Fettelaar, Daan

    2013-01-01

    In line with fear of crime research, schools should be secure places where pupils feel safe in order to function well. Various types of risk and promotive variables at school and pupil level may differently influence a pupil's feelings of safety in school, the school surroundings, and at home. The aim is to elaborate and test a theoretical…

  11. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2006-01-01

    .... The first section of the report, Stability and Security in Iraq, describes trends and progress towards meeting goals for political stability, strengthening economic activity, and achieving a stable...

  12. Measuring emotional intelligence of medical school applicants.

    Science.gov (United States)

    Carrothers, R M; Gregory, S W; Gallagher, T J

    2000-05-01

    To discuss the development, pilot testing, and analysis of a 34-item semantic differential instrument for measuring medical school applicants' emotional intelligence (the EI instrument). The authors analyzed data from the admission interviews of 147 1997 applicants to a six-year BS/MD program that is composed of three consortium universities. They compared the applicants' scores on traditional admission criteria (e.g., GPA and traditional interview assessments) with their scores on the EI instrument (which comprised five dimensions of emotional intelligence), breaking the data out by consortium university (each of which has its own educational ethos) and gender. They assessed the EI instrument's reliability and validity for assessing noncognitive personal and interpersonal qualities of medical school applicants. The five dimensions of emotional intelligence (maturity, compassion, morality, sociability, and calm disposition) indicated fair to excellent internal consistency: reliability coefficients were .66 to .95. Emotional intelligence as measured by the instrument was related to both being female and matriculating at the consortium university that has an educational ethos that values the social sciences and humanities. Based on this pilot study, the 34-item EI instrument demonstrates the ability to measure attributes that indicate desirable personal and interpersonal skills in medical school applicants.

  13. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  14. A brief measure of adolescent perceptions of school climate.

    Science.gov (United States)

    White, Nick; La Salle, Tamika; Ashby, Jeffrey S; Meyers, Joel

    2014-09-01

    Student perceptions of school climate represent the ways students feel about the school environment. These include perceptions regarding safety, teaching and learning, and relationships within the school. It has been found that student perceptions of school climate are positively correlated with academic achievement (Brookover et al., 1978), and negatively correlated with risky behaviors (Bandyopadhyay, Cornell, & Konold, 2009; Bayar & Ucanok, 2012; Wang, Berry, & Swearer, 2013). The Georgia Brief School Climate Inventory (GaBSCI) is a measure of student perceptions of school climate. The brevity of the 9-item instrument makes it ideal as a general measure that can be used to monitor student perceptions of school climate. The survey was anonymously administered to 130,968 sixth- and eighth-grade students in the state of Georgia. Cronbach's alpha for the scale was 0.71. Exploratory and confirmatory factor analyses verified the scale's structure. Student perceptions of climate from the GaBSCI varied based on race/ethnicity, gender, and grade. Additional support for the construct validity of the GaBSCI was obtained based on its relationships with several behaviors related to bullying, and the moderating effects of grade and gender on these relationships. Implications for research and practice are discussed. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  15. Truck Driving Schools

    Data.gov (United States)

    Department of Homeland Security — his dataset is composed of any type of Post Secondary Education facility such as: colleges, universities, technical schools, or trade schools that provide training...

  16. Methodology for measurement in schools and kindergartens: experiences

    International Nuclear Information System (INIS)

    Fotjikova, I.; Navratilova Rovenska, K.

    2015-01-01

    In more than 1500 schools and preschool facilities, long-term radon measurement was carried out in the last 3 y. The negative effect of thermal retrofitting on the resulting long-term radon averages is evident. In some of the facilities, low ventilation rates and correspondingly high radon levels were found, so it was recommended to change ventilation habits. However, some of the facilities had high radon levels due to its ingress from soil gas. Technical measures should be undertaken to reduce radon exposure in this case. The paper presents the long-term experiences with the two-stage measurement methodology for investigation of radon levels in school and preschool facilities and its possible improvements. (authors)

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  18. Impact of Tourette Syndrome on School Measures in a Nationally Representative Sample.

    Science.gov (United States)

    Claussen, Angelika H; Bitsko, Rebecca H; Holbrook, Joseph R; Bloomfield, Jeanette; Giordano, Kathy

    2018-05-01

    Children with Tourette syndrome (TS) are at risk for a variety of co-occurring conditions and learning and school problems. The purpose of this study was to determine the impact of TS and co-occurring conditions on school measures. Parent-reported data from the 2007-2008 and 2011-2012 National Survey of Children's Health were combined (n = 129,353 children aged 6-17 yrs). Parent report of health care provider diagnosis of TS; co-occurring mental, emotional, and behavioral conditions; learning and language conditions; and school measures were assessed. School measures included type of school, individual education plan (IEP), number of school days missed, school problems, doing well in school, doing homework, and repeating a grade. Children with TS were compared with those who never had TS on school measures accounting for co-occurring conditions. After adjusting for demographics, compared with children without TS, children currently with TS were more likely to have an IEP, have a parent contacted about school problems, and not complete homework. After further adjusting for co-occurring conditions, only IEP status remained statistically significant. Compared with children with mild TS, children with moderate or severe TS were more likely to have an IEP, repeat a grade, encounter school problems, and not care about doing well in school. Tourette syndrome severity and co-occurring conditions are associated with school challenges and educational service needs. Awareness among health care providers, teachers and parents of the potential challenges related to both TS and co-occurring conditions would help to best support the child's education.

  19. [Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].

    Science.gov (United States)

    Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo

    2016-01-01

    Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes.

  20. SOCIAL SECURITY IN MODERN ERA

    African Journals Online (AJOL)

    2018-03-28

    Mar 28, 2018 ... Lecturer, Department of Social Work, Bindura University of Science Education; Email. ... Lecturer, School of Social Work, University of Zimbabwe, Mount ... There are two types of informal social security: traditional or family ...

  1. A game theoretic framework for evaluation of the impacts of hackers diversity on security measures

    International Nuclear Information System (INIS)

    Zare Moayedi, Behzad; Azgomi, Mohammad Abdollahi

    2012-01-01

    Game theoretical methods offer new insights into quantitative evaluation of dependability and security. Currently, there is a wide range of useful game theoretic approaches to model the behaviour of intelligent agents. However, it is necessary to revise these approaches if there is a community of hackers with significant diversity in their behaviours. In this paper, we introduce a novel approach to extend the basic ideas of applying game theory in stochastic modelling. The proposed method classifies the community of hackers based on two main criteria used widely in hacker classifications, which are motivation and skill. We use Markov chains to model the system and compute the transition rates between the states based on the preferences and the skill distributions of hacker classes. The resulting Markov chains can be solved to obtain the desired security measures. We also present the results of an illustrative example using the proposed approach, which examines the relation between the attributes of the community of hackers and the security measures.

  2. Measuring School Climate in High Schools: A Focus on Safety, Engagement, and the Environment

    Science.gov (United States)

    Bradshaw, Catherine P.; Waasdorp, Tracy E.; Debnam, Katrina J.; Johnson, Sarah Lindstrom

    2014-01-01

    Background: School climate has been linked to multiple student behavioral, academic, health, and social-emotional outcomes. The US Department of Education (USDOE) developed a 3-factor model of school climate comprised of safety, engagement, and environment. This article examines the factor structure and measurement invariance of the USDOE model.…

  3. Unsafe Gods: Security, Secularism and Schooling

    Science.gov (United States)

    Davies, Lynn

    2014-01-01

    This book makes the compelling argument that religion can be complicit in conflict and that a new secularism is vital to foster security. Using insights from complexity science, it shows how dynamic secularism can be used to accommodate diverse faiths and beliefs within worldly politics. Exploration of the interplay of religion and education in…

  4. Attachment security, personality, and adjustment of elementary school children.

    Science.gov (United States)

    Goldner, Limor; Scharf, Miri

    2013-01-01

    Children's development is assumed to be closely related to their attachment security and their personality. The authors' aim was to examine the joint contribution of attachment security and personality traits to children's adjustment by examining diverse children's outcomes (emotional symptoms, social functioning, and behavioral problems) and using various perspectives (children, parents, and teachers). The sample comprised 247 8-12-year-old children from low socioeconomic status neighborhoods. Personality and attachment contribute to the different domains of adjustment. In cases of moderation, attachment security moderates the implications of personality traits on children's adjustment. The findings highlight the contribution of positive personality tendencies in playing down the difficulties of insecurely attached children.

  5. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  6. Food Security and Leukocyte Telomere Length in Adult Americans

    Directory of Open Access Journals (Sweden)

    Mohsen Mazidi

    2017-01-01

    Full Text Available Background and Purpose. Leukocyte telomere length (LTL is a biomarker of biologic age. Whether food security status modulates LTL is still unknown. We investigated the association between food security and LTL in participants of the 1999–2002 US National Health and Nutrition Examination Survey (NHANES. Methods. Analysis of covariance (ANCOVA was used to evaluate the association between food security categories and LTL controlling for sex, race, and education and accounting for the survey design and sample weights. Results. We included 10,888 participants with 5228 (48.0% being men. They were aged on average 44.1 years. In all, 2362 (21.7% had less than high school, 2787 (25.6% had achieved high school, while 5705 (52.5% had done more than high school. In sex-, race-, and education-adjusted ANCOVA, average LTL (T/S ratio for participants with high food security versus those with marginal, low, or very low food security was 1.32 versus 1.20 for the age group 25–35 years and 1.26 versus 1.11 for the 35–45 years, (p<0.001. Conclusion. The association between food insecurity and LTL shortening in young adults suggest that some of the future effects of food insecurity on chronic disease risk in this population could be mediated by telomere shortening.

  7. International and internal migration measured from the School Census in England.

    Science.gov (United States)

    Simpson, Ludi; Marquis, Naomi; Jivraj, Stephen

    2010-01-01

    The School Census is the only regularly updated dataset covering almost all of the population of a specific age, which records changes of address along with ethnicity and some family economic circumstances. It can be used to measure internal and international family migration as shown in this report. The School Census is suited to identify and quantify new local migration streams between censuses, successfully identifying the local distribution of Eastern European immigration in the decade since 2000. The measures do not provide a complete measure of migration, either internally or internationally. The exclusion of those outside the state school system means that internal migration is under-estimated, and international migration is approximately measured. The advantages of the School Census are its frequent updates, its fine geographical information, and its indicators of ethnicity and low family income, which powerfully complement other sources.

  8. Nuclear Security Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide (Arabic Edition)

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to Member States for the development, or improvement of nuclear security systems and measures for the detection of criminal or unauthorized acts with nuclear security implications involving nuclear and other radioactive material out of regulatory control. It describes the elements of an effective nuclear security detection architecture which is composed of an integrated set of nuclear security systems and measures, and is based on an appropriate legal and regulatory framework for the implementation of the national detection strategy. The publication is an implementing guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, legislative bodies, competent authorities, institutions, and individuals involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures for the detection of nuclear and other radioactive material out of regulatory control

  9. Data Security Measures in the IT Service Industry: A Balance between Knowledge & Action

    Directory of Open Access Journals (Sweden)

    N. Mlitwa

    2008-12-01

    Full Text Available That knowledge is power is fast becoming a cliche within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www, it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even theft of confidential information, leading to financial losses in information dependant competitive institutions is therefore high. Improving efficiencies through ICT therefore, comes with security responsibilities. The problem however is that most organizations tend to focus on task-enhancing efficiencies and neglect security. Possibly due to limited awareness about security, underestimating the problem, concerns about security costs, or through plain negligence. The activity theory of Engestrm and the activity analysis development framework of Mursu et al are used as analytical lenses to the cybercrime challenge in this paper. A practical case study of Company X, an IT service provider in Malawi is then used to understand the extent to which organisations that offer electronic data solutions prioritise security in their operations. It is found that even better informed organisations fall short in taking adequate data security measures. A recommendation for all organisations is that they should not only have a clear policy, but also ensure that it is routinely and consistently implemented throughout the operations if information capital is to be secured. A framework towards a holistic approach to thinking about, and in addressing cybercrime is suggested, and recommended in the paper.

  10. Impact of Tourette Syndrome on School Measures in a Nationally Representative Sample

    Science.gov (United States)

    Claussen, Angelika H.; Bitsko, Rebecca H.; Holbrook, Joseph R.; Bloomfield, Jeanette; Giordano, Kathy

    2018-01-01

    Objective Children with Tourette syndrome (TS) are at risk for a variety of co-occurring conditions and learning and school problems. The purpose of this study was to determine the impact of TS and co-occurring conditions on school measures. Methods Parent-reported data from the 2007–2008 and 2011–2012 National Survey of Children’s Health were combined (n = 129,353 children aged 6–17 yrs). Parent report of health care provider diagnosis of TS; co-occurring mental, emotional, and behavioral conditions; learning and language conditions; and school measures were assessed. School measures included type of school, individual education plan (IEP), number of school days missed, school problems, doing well in school, doing homework, and repeating a grade. Children with TS were compared with those who never had TS on school measures accounting for co-occurring conditions. Results After adjusting for demographics, compared with children without TS, children currently with TS were more likely to have an IEP, have a parent contacted about school problems, and not complete homework. After further adjusting for co-occurring conditions, only IEP status remained statistically significant. Compared with children with mild TS, children with moderate or severe TS were more likely to have an IEP, repeat a grade, encounter school problems, and not care about doing well in school. Conclusion Tourette syndrome severity and co-occurring conditions are associated with school challenges and educational service needs. Awareness among health care providers, teachers and parents of the potential challenges related to both TS and co-occurring conditions would help to best support the child’s education. PMID:29432328

  11. Conceptual proposals for measuring the impact of international regimes on energy security

    International Nuclear Information System (INIS)

    Sander, Michael

    2013-01-01

    The paper proposes two concepts to assess the effect of international regimes on energy security. Existing indicators focus mainly on state-level factors, excluding international influences. International relation scholars on the other hand see a clear connection between international regimes and stable energy relations. International regimes stabilise energy relations by providing frameworks for negotiations, defining, controlling and sanctioning compliance and allowing the actors to engage in package deals. The researcher needs to include these factors in a complete assessment of political energy security risks. As first step, the paper uses the effectiveness of control mechanisms as basis for such consideration. It refers specifically to international arbitration as the most important control mechanism in international energy relations. The simplest measurement option is the share of a county's energy imports covered by a certain regime. The paper applies the Oslo-Potsdam-Solution to account for outcome effectiveness. It applies a variant of the International Regimes Data Base protocol to account for effective regime structures. In a last section, the paper proposes some possible paths for future research. - Highlights: • International regimes mitigate political risks for energy supply and must be considered. • The paper proposes two concepts to measure energy regime effectiveness. • The OPS-variant measures output, the IRDB-variant measures structure effectiveness. • The paper offers a preliminary feasibility test for the concepts. • Finally, it suggests further roads for research

  12. Measuring global water security towards sustainable development goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  13. 76 FR 30986 - Bureau of International Security and Nonproliferation; Imposition of Nonproliferation Measures...

    Science.gov (United States)

    2011-05-27

    ... DEPARTMENT OF STATE [Public Notice 7485] Bureau of International Security and Nonproliferation; Imposition of Nonproliferation Measures Against Foreign Persons, Including a Ban on U.S. Government... of foreign entities and one foreign person have engaged in activities that warrant the imposition of...

  14. The Assessment of School Climate: Review and Appraisal of Published Student-Report Measures

    Science.gov (United States)

    Ramelow, Daniela; Currie, Dorothy; Felder-Puig, Rosemarie

    2015-01-01

    School climate measurement is a long-standing topic in educational research. This review article provides an overview and appraisal of school climate measures published between 2003 and 2013 in scientific journals. A search for published school climate instruments for secondary school students was made in three databases. Twelve articles meeting…

  15. Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2018-03-01

    There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience. A questionnaire was given to 125 patients with a THA during a follow-up appointment. Those who had passed through airport security after January 2014 met inclusion criteria. A survey was administered that addressed the number of encounters with airport security, frequency of metal detector activation, additional screening procedures utilised, whether security officials required prosthesis documentation, and perceived inconvenience. 51 patients met inclusion criteria. 10 patients (20%) reported triggered security scanners. 4 of the 10 patients stated they had surgical hardware elsewhere in the body. 13 of the 51 patients (25%) believed that having their THA increased the inconvenience of traveling. This is different from the historical cohort with standard metal detectors which patients reported a greater incidence of alarm triggering (n = 120 of 143; p = 0.0001) and perceived inconvenience (n = 99 of 143; p = 0.0001). The percentage of patients who have THA triggering security alarms has decreased. Furthermore, the number of patients who feel that their prosthesis caused traveling inconvenience has decreased. We feel that this decrease in alarms triggered and improved perceptions about inconvenience are related to the increased usage of new technology.

  16. Homeland Security Affairs Journal, Volume II - 2006: Issue 1, April

    OpenAIRE

    2006-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. April 2006. Welcome to the third edition of Homeland Securit...

  17. Comprehensive legal aid to the participants in criminal proceedings when applying security measures

    Directory of Open Access Journals (Sweden)

    Fadeev P.V.

    2014-12-01

    Full Text Available Legal assistance to the participants in criminal procedure is represented as a complex phenomenon, including the features of international legal assistance, qualified legal assistance, as well as the activities of public authorities in criminal proceedings and professional lawyers (attorneys, advocates, representatives to assist physical and legal persons to protect, safeguard and realize their rights and interests. Legal assistance in case of threat to life, health, rights of participants in criminal proceedings is considered. The activity of certain subjects of criminal proceedings aimed at explaining the rights of crime victims is analyzed. The grounds for applying security measures are determined. Proposals for improving part 3 of article 11 of the RF Criminal Procedure Code are made: “3. In case there is a threat of causing physical, property, moral damage or other harm prohibited by criminal law to rights and legitimate interests of the victim, witness or other participants in criminal proceedings as well as their close relatives, relatives or close persons, the court (judge, the prosecutor, the head of the investigative agency, the investigator, the preliminary investigation agency take security measures, provided by part 9 of article 166, part 2 of article 186, part 8 of article 193, paragraph 4 of part 2 of article 241 and part 5 of article 278 of this Code as well as other security measures provided by the RF legislation, in respect of those persons within twenty-four hours on the basis of these persons’ written (oral statement or on their own initiative within their competence”.

  18. Risk Informed Approach for Nuclear Security Measures for Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to States for developing a risk informed approach and for conducting threat and risk assessments as the basis for the design and implementation of sustainable nuclear security systems and measures for prevention of, detection of, and response to criminal and intentional unauthorised acts involving nuclear and other radioactive material out of regulatory control. It describes concepts and methodologies for a risk informed approach, including identification and assessment of threats, targets, and potential consequences; threat and risk assessment methodologies, and the use of risk informed approaches as the basis for informing the development and implementation of nuclear security systems and measures. The publication is an Implementing Guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, law enforcement agencies and experts from competent authorities and other relevant organizations involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures related to nuclear and other radioactive material out of regulatory control

  19. Operational Contract Support: Economic Impact Evaluation and Measures of Effectiveness

    Science.gov (United States)

    2017-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES...DATES COVERED MBA professional report 4. TITLE AND SUBTITLE OPERATIONAL CONTRACT SUPPORT: ECONOMIC IMPACT EVALUATION AND MEASURES OF EFFECTIVENESS 5...evaluation, expeditionary economics , operational contract support, measure of effectiveness 15. NUMBER OF PAGES 89 16. PRICE CODE 17. SECURITY

  20. Measuring social networks in British primary schools through scientific engagement

    Science.gov (United States)

    Conlan, A. J. K.; Eames, K. T. D.; Gage, J. A.; von Kirchbach, J. C.; Ross, J. V.; Saenz, R. A.; Gog, J. R.

    2011-01-01

    Primary schools constitute a key risk group for the transmission of infectious diseases, concentrating great numbers of immunologically naive individuals at high densities. Despite this, very little is known about the social patterns of mixing within a school, which are likely to contribute to disease transmission. In this study, we present a novel approach where scientific engagement was used as a tool to access school populations and measure social networks between young (4–11 years) children. By embedding our research project within enrichment activities to older secondary school (13–15) children, we could exploit the existing links between schools to achieve a high response rate for our study population (around 90% in most schools). Social contacts of primary school children were measured through self-reporting based on a questionnaire design, and analysed using the techniques of social network analysis. We find evidence of marked social structure and gender assortativity within and between classrooms in the same school. These patterns have been previously reported in smaller studies, but to our knowledge no study has attempted to exhaustively sample entire school populations. Our innovative approach facilitates access to a vitally important (but difficult to sample) epidemiological sub-group. It provides a model whereby scientific communication can be used to enhance, rather than merely complement, the outcomes of research. PMID:21047859

  1. Martin Continues His Homeland Security Profession with New UASI Position

    OpenAIRE

    Issvoran, Heather

    2014-01-01

    Bruce Martin has found a second act in homeland security. The fire services veteran and college educator is now Project Manager of the Bay Area Urban Areas Security Initiative (UASI), overseeing its Chemical, Biological, Radiological, Nuclear Explosives (CBRNE) program. Martin is a 2010 master’s degree graduate of the Naval Postgraduate School Center for Homeland Defense and Security.

  2. Security Measures in Automated Assessment System for Programming Courses

    Directory of Open Access Journals (Sweden)

    Jana Šťastná

    2015-12-01

    Full Text Available A desirable characteristic of programming code assessment is to provide the learner the most appropriate information regarding the code functionality as well as a chance to improve. This can be hardly achieved in case the number of learners is high (500 or more. In this paper we address the problem of risky code testing and availability of an assessment platform Arena, dealing with potential security risks when providing an automated assessment for a large set of source code. Looking at students’ programs as if they were potentially malicious inspired us to investigate separated execution environments, used by security experts for secure software analysis. The results also show that availability issues of our assessment platform can be conveniently resolved with task queues. A special attention is paid to Docker, a virtual container ensuring no risky code can affect the assessment system security. The assessment platform Arena enables to regularly, effectively and securely assess students' source code in various programming courses. In addition to that it is a motivating factor and helps students to engage in the educational process.

  3. State-level high school completion rates: Concepts, measures, and trends.

    Directory of Open Access Journals (Sweden)

    John Robert Warren

    2005-12-01

    Full Text Available Since the mid 1970s the national rate at which incoming 9th graders have completed high school has fallen slowly but steadily; this is also true in 41 states. In 2002, about three in every four students who might have completed high school actually did so; in some states this figure is substantially lower. In this paper I review state-level measures of high school completion rates and describe and validate a new measure that reports these rates for 1975 through 2002. Existing measures based on the Current Population Survey are conceptually imperfect and statistically unreliable. Measures based on Common Core Data (CCD dropout information are unavailable for many states and have different conceptual weaknesses. Existing measures based on CCD enrollment and completion data are systematically biased by migration, changes in cohort size, and/or grade retention. The new CCD-based measure described here is considerably less biased, performs differently in empirical analyses, and gives a different picture of the dropout situation across states and over time.

  4. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries

    International Nuclear Information System (INIS)

    Talarico, Luca; Reniers, Genserik; Sörensen, Kenneth; Springael, Johan

    2015-01-01

    In this paper we present a multi-modal security-transportation model to allocate security resources within a chemical supply chain which is characterized by the use of different transport modes, each having their own security features. We consider security-related risks so as to take measures against terrorist acts which could target critical transportation systems. The idea of addressing security-related issues, by supporting decisions for preventing or mitigating intentional acts on transportation infrastructure, has gained attention in academic research only recently. The decision model presented in this paper is based on game theory and it can be employed to organize intelligence capabilities aimed at securing chemical supply chains. It enables detection and warning against impending attacks on transportation infrastructures and the subsequent adoption of security countermeasures. This is of extreme importance for preventing terrorist attacks and for avoiding (possibly huge) human and economic losses. In our work we also provide data sources and numerical simulations by applying the proposed model to a illustrative multi-modal chemical supply chain. - Highlights: • A model to increase the security in a multimodal chemical supply chain is proposed. • The model considers adaptive opponents having multi-attribute utility functions. • The model is based on game theory using an attacker–defender schema. • The model provides recommendations about where to allocate security measures. • Numerical simulations on a sample multimodal chemical supply chain are shown

  5. Basic security measures for IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Oscar P. Sarmiento

    2008-05-01

    Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.

  6. Determining the Measurement Quality of a Montessori High School Teacher Evaluation Survey

    Directory of Open Access Journals (Sweden)

    Anthony Philip Setari

    2017-05-01

    Full Text Available The purpose of this study was to conduct a psychometric validation of a course evaluation instrument, known as a student evaluation of teaching (SET, implemented in a Montessori high school. The authors demonstrate to the Montessori community how to rigorously examine the measurement and assessment quality of instruments used within Montessori schools. The Montessori high school community needs an SET that has been rigorously examined for measurement issues. The examined SET was developed by a Montessori high school, and the sample data were collected from Montessori high school students. Using a Rasch partial credit model, the results of the analysis identified several measurement issues, including multidimensionality, misfit items, and inappropriate item difficulty levels. A revised version of the SET underwent the same analysis procedure, and the results indicated that measurement issues persisted. The authors suggest several ways to improve the overall measurement quality of the instrument while keeping the Montessori foundation. Additional validation studies with a revised version of the SET will be needed before the instrument can be endorsed for full implementation in a Montessori setting.

  7. Macrosecuritization and Security Constellations

    DEFF Research Database (Denmark)

    Buzan, Barry; Wæver, Ole

    2009-01-01

    the middle and system levels, and asks whether there is not more of substance there than the existing Copenhagen school analyses suggests. It revisits the under-discussed concept of security constellations in Copenhagen school theory, and adds to it the idea of macrosecuritizations as ways of getting...... active both because of the facility with which collective political units can construct each other as threats, and the difficulty of finding audiences for the kinds of securitizations and referent objects that are available at the individual and system levels. This paper focuses on the gap between...

  8. Measuring energy security. A conceptual note

    Energy Technology Data Exchange (ETDEWEB)

    Frondel, Manuel; Schmidt, Christoph M.

    2008-11-06

    Along with the oil price, concerns about the security of energy supply have soared once again in recent years.Yet, more than 30 years after the OPEC oil embargo in 1973, energy security still remains a diffuse concept. This paper conceives a statistical indicator that aims at characterizing the energy supply risk of nations that are heavily dependent on energy imports. Our indicator condenses the bulk of empirical information on the imports of fossil fuels originating from a multitude of export countries as well as data on the indigenous contribution to the domestic energy supply into a single parameter. Applying the proposed concept to empirical energy data on Germany and the U.S. (1980-2004), we find that there is a large gap in the energy supply risks between both countries, with Germany suffering much more from a tensed energy supply situation today than the U.S. (orig.)

  9. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  10. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  11. Nuclear Security Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2013-01-01

    Nuclear terrorism and the illicit trafficking of nuclear and other radioactive material threaten the security of all States. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The possibility that nuclear and other radioactive material may be used for terrorist acts cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material, and to establish capabilities for detection and response to nuclear and other radioactive material out of regulatory control. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This approach recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in nuclear and other radioactive material; national response plans; and contingency measures. Within its nuclear security programme, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking; and to detect and respond to nuclear security events. This is an Implementing Guide on nuclear security systems and measures for the detection of nuclear and other radioactive material out of regulatory control. The objective of the publication is to provide guidance to Member States for the

  12. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  13. Promoting or suppressing resilience to mental health outcomes in at risk young people: The role of parental and peer attachment and school connectedness.

    Science.gov (United States)

    Oldfield, Jeremy; Stevenson, Andrew; Ortiz, Emily; Haley, Bethany

    2018-04-01

    Adolescent attachment relationships formed with parents are salient predictors of mental health. Few studies, however, have demonstrated whether peer attachment or school connectedness can predict resilience to mental health difficulties when a young person is at risk due to poor parental attachment. Ninety adolescents (44 females and 46 males) living in economically disadvantaged areas and attending informal schooling projects in and around Guatemala City participated. Participants completed self-report measures of parental and peer attachment, school connectedness and mental health. Resilience to mental health difficulties was predicted by more secure school connectedness but lower levels of secure peer attachment. School connectedness may provide a role in promoting resilience for mental health for adolescents living in risk, whereas the potential negative influence that secure attachments to peers exerts, in context of poor parental attachment, needs to be explored further. Crown Copyright © 2018. Published by Elsevier Ltd. All rights reserved.

  14. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

    Directory of Open Access Journals (Sweden)

    Ashish Rauniyar

    2018-01-01

    Full Text Available With the advent of Internet of things (IoT and cloud computing technologies, we are in the era of automation, device-to-device (D2D and machine-to-machine (M2M communications. Automated vehicles have recently gained a huge attention worldwide, and it has created a new wave of revolution in automobile industries. However, in order to fully establish automated vehicles and their connectivity to the surroundings, security, privacy, and dependability always remain a crucial issue. One cannot deny the fact that such automatic vehicles are highly vulnerable to different kinds of security attacks. Also, today’s such systems are built from generic components. Prior analysis of different attack trends and vulnerabilities enables us to deploy security solutions effectively. Moreover, scientific research has shown that a “group” can perform better than individuals in making decisions and predictions. Therefore, this paper deals with the measurable security, privacy, and dependability of automated vehicles through the crowd-based intelligence approach that is inspired from swarm intelligence. We have studied three use case scenarios of automated vehicles and systems with vehicular fog and have analyzed the security, privacy, and dependability metrics of such systems. Our systematic approaches to measuring efficient system configuration, security, privacy, and dependability of automated vehicles are essential for getting the overall picture of the system such as design patterns, best practices for configuration of system, metrics, and measurements.

  15. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  16. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  17. Measurement error in income and schooling, and the bias of linear estimators

    DEFF Research Database (Denmark)

    Bingley, Paul; Martinello, Alessandro

    The characteristics of measurement error determine the bias of linear estimators. We propose a method for validating economic survey data allowing for measurement error in the validation source, and we apply this method by validating Survey of Health, Ageing and Retirement in Europe (SHARE) data...... with Danish administrative registers. We find that measurement error in surveys is classical for annual gross income but non-classical for years of schooling, causing a 21% amplification bias in IV estimators of returns to schooling. Using a 1958 Danish schooling reform, we contextualize our result...

  18. Measuring energy security performance within China: Toward an inter-provincial prospective

    International Nuclear Information System (INIS)

    Zhang, Long; Yu, Jing; Sovacool, Benjamin K.; Ren, Jingzheng

    2017-01-01

    China has been the world's largest energy consumer and producer for many years, yet while myriad studies have investigated Chinese performance on energy metrics compared to other countries, few to none have looked internally at Chinese provinces. This paper firstly develops a five-dimensional evaluation system centered on the energy security dimensions of availability and diversity, affordability and equality, technology and efficiency, environmental sustainability, and governance and innovation. It then correlates these dimensions to 20 distinct energy security metrics that are used to assess the energy security performance of 30 Chinese provinces, divided into eight regions. Our results reveal both trends in energy policy and practice as well as provincial status of comparative energy security for the year 2013. We find, for instance, that there is no province which performs well in all five of the energy security dimensions, and that all provinces confronted threats related to energy availability and diversity. We also demonstrate that in comparative terms, the Middle Reaches of Yellow River and the Northwest were the most energy-secure, while the Middle Reaches of Yangtze River and the Northeast were least energy-secure. - Highlights: • We assessed energy security for 30 Chinese provinces across five dimensions. • Fuzzy AHP, PROMETHEE and Sensitivity Analysis are used to investigate. • Western provinces perform better performance than eastern provinces in 2013. • Energy availability and diversity is the most severe threat facing China's energy security. • Developing renewable energy will help improve China's Provincial energy security significantly.

  19. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

    OpenAIRE

    Kalaiprasath, R.; Elankavi, R.; Udayakumar, R.

    2017-01-01

    The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether thes...

  20. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  1. Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture

    Science.gov (United States)

    Jurčević, M.; Hegeduš, H.; Golub, M.

    2010-01-01

    Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.

  2. Assessing drivers and barriers of energy-saving measures in Oklahoma’s public schools

    International Nuclear Information System (INIS)

    Castleberry, Becca; Gliedt, Travis; Greene, J. Scott

    2016-01-01

    Implementing energy conservation initiatives within public schools, including both behavioral changes as well as building retrofits, can generate cost saving and educational benefits. However, the level of energy efficiency improvements that can be achieved may depend on the socio-economic characteristics of the school or the underlying district. The purpose of this research is to identify and examine the factors that have a role in influencing the adoption of energy-saving practices and/or building retrofits within Oklahoma’s public schools. In order to investigate these factors, a survey was administered to public school administrators across the state. The results illustrate different factors that drive schools to make decisions associated with energy conservation and retrofitting efforts. A comparative analysis between different types of schools (e.g., rural vs. urban, low- vs. high-income) was also conducted to discover the combination of characteristics that are associated with energy-saving measures. The findings could help school administrators and teachers understand how they might adopt new behaviors or technologies. - Highlights: • Energy performance improvements depend on characteristics of a school district. • Districts with environmental science classes more likely to take energy measures. • Cost savings motivated energy measures in high-income/large-population districts. • A cluster analysis revealed geographic patterns of energy saving measures.

  3. Middle School Characteristics That Predict Student Achievement, as Measured by the School-Wide California API Score

    Science.gov (United States)

    Paredes, Josie Abaroa

    2013-01-01

    The purpose of this study was to investigate, through quantitative research, effective middle school characteristics that predict student achievement, as measured by the school-wide California API score. Characteristics were determined using an instrument developed by the Office of Superintendent of Public Instruction (OSPI), which asked middle…

  4. Analysis and Measures to Improve Waste Management in Schools

    Directory of Open Access Journals (Sweden)

    Elena Cristina Rada

    2016-08-01

    Full Text Available Assessing waste production in schools highlights the contribution of school children and school staff to the total amount of waste generated in a region, as well as any poor practices of recycling (the so-called separate collection of waste in schools by the students, which could be improved through educational activities. Educating young people regarding the importance of environmental issues is essential, since instilling the right behavior in school children is also beneficial to the behavior of their families. The way waste management was carried out in different schools in Trento (northern Italy was analyzed: a primary school, a secondary school, and three high schools were taken as cases of study. The possible influence of the age of the students and of the various activities carried out within the schools on the different behaviors in separating waste was also evaluated. The results showed that the production of waste did not only depend on the size of the institutes and on the number of occupants, but, especially, on the type of activities carried out in addition to the ordinary classes and on the habits of both pupils and staff. In the light of the results obtained, some corrective measures were proposed to schools, aimed at increasing the awareness of the importance of the right behavior in waste management by students and the application of good practices of recycling.

  5. Systematic indoor radon and gamma-ray measurements in Slovenian schools

    International Nuclear Information System (INIS)

    Vaupotic, J.; Sikovec, M.; Kobal, I.

    2000-01-01

    During the winter months of 1992/93 and 1993/94, instantaneous indoor radon concentrations and gamma dose rates were measured in 890 schools in Slovenia attended in total by about 280,000 pupils. Under closed conditions, the room to be surveyed was closed for more than 12 h prior to sampling, the air was sampled into alpha scintillation cells with a volume of 700 cm 3 , and alpha activity was measured. An arithmetic mean of 168 Bq m -3 and a geometric mean of 82 Bq m -3 were obtained. In 67% of schools, indoor radon concentrations were below 100 Bq m -3 , and in 8.7% (77 schools with about 16,000 pupils) they exceeded 400 Bq m -3 , which is the proposed Slovene action level. In the majority of cases, radon concentrations were high due to the geological characteristics of the ground. Approximately 70% of schools with high radon levels were found in the Karst region. Gamma dose rates were measured using a portable scintillation counter. An arithmetic mean of 102 nGy h -1 and a geometric mean of 95 nGy h -1 were obtained. No extraordinarily high values were recorded

  6. Estimating the effectiveness of early control measures through school absenteeism surveillance in observed outbreaks at rural schools in Hubei, China.

    Science.gov (United States)

    Fan, Yunzhou; Yang, Mei; Jiang, Hongbo; Wang, Ying; Yang, Wenwen; Zhang, Zhixia; Yan, Weirong; Diwan, Vinod K; Xu, Biao; Dong, Hengjin; Palm, Lars; Liu, Li; Nie, Shaofa

    2014-01-01

    School absenteeism is a common data source in syndromic surveillance, which allows for the detection of outbreaks at an early stage. Previous studies focused on its correlation with other data sources. In this study, we evaluated the effectiveness of control measures based on early warning signals from school absenteeism surveillance in rural Chinese schools. A school absenteeism surveillance system was established in all 17 primary schools in 3 adjacent towns in the Chinese region of Hubei. Three outbreaks (varicella, mumps, and influenza-like illness) were detected and controlled successfully from April 1, 2012, to January 15, 2014. An impulse susceptible-exposed-infectious-recovered model was used to fit the epidemics of these three outbreaks. Moreover, it simulated the potential epidemics under interventions resulting from traditional surveillance signals. The effectiveness of the absenteeism-based control measures was evaluated by comparing the simulated datasets. The school absenteeism system generated 52 signals. Three outbreaks were verified through epidemiological investigation. Compared to traditional surveillance, the school absenteeism system generated simultaneous signals for the varicella outbreak, but 3 days in advance for the mumps outbreak and 2-4 days in advance for the influenza-like illness outbreak. The estimated excess protection rates of control measures based on early signals were 0.0%, 19.0-44.1%, and 29.0-37.0% for the three outbreaks, respectively. Although not all outbreak control measures can benefit from early signals through school absenteeism surveillance, the effectiveness of early signal-based interventions is obvious. School absenteeism surveillance plays an important role in reducing outbreak spread.

  7. Bureaucratic Structure in Schools: A Refinement and Synthesis in Measurement.

    Science.gov (United States)

    Sousa, David A.; Hoy, Wayne K.

    1981-01-01

    Compares two methods of measuring bureaucratic structure, Hall's organizational inventory and the University of Aston (England) approach, and tests them using data from 55 public high schools in New Jersey. Factor analysis reveals four underlying dimensions of school structure, including organizational control, rational specialization, system…

  8. Cost-effectiveness of Security Measures: A model-based Framework

    NARCIS (Netherlands)

    Pieters, Wolter; Probst, Christian W.; Lukszo, Zofia; Montoya, L.; Tsiakis, Theodosios; Kargidis, Theodorus; Katsaros, Panagiotis

    Recently, cyber security has become an important topic on the agenda of many organisations. It is already widely acknowledged that attacks do happen, and decision makers face the problem of how to respond. As it is almost impossible to secure a complex system completely, it is important to have an

  9. ANTI-CORRUPTION MEASURES FOR CORPORATE SECURITY

    Directory of Open Access Journals (Sweden)

    Natasha Georgieva Hadji Krsteski

    2017-04-01

    Full Text Available Corporate security should commit to ethical management and raising the quality of companies and markets through improving cooperation and transparency by applying anticorruption measures such as accepting a code of ethics; respect and follow international business principles for dealing with bribery; improve their transparency - via access to information; involvement in politics to protect persons who disclose corruption cases; and improving corporate governance - through active mutual discussions on adjustment of legal regulations. Research methods used in the paper are: qualitative analysis of secondary data obtained from relevant institutions. Results obtained from the survey include fighting corruption in corporations must find a unique solution that is long-term strategy developed transparent society crucial criteria and principles to meet the political criteria by the fulfillment of anti-corruption standards; it requires continuous cooperation of public and private sector, NGOs and the general corpus of all stakeholders in the country against corruption; the lack of a legal framework or platform for establishing public and private partnerships, is an important factor for anti-corruption measures to improve corporate governance; mechanisms for cooperation does not seem sufficiently developed between the public, private, political and civil society; the most important factor to tackle corruption is to adopt a law on public prosecutors and determination of higher norms and standards. Conclusions drawn from the survey: in the area of pre-trial procedure requires shifting responsibilities of Interior Ministry body training in the area of the judicial system; it is necessary to change the Criminal Code and Criminal Procedure Code by changing certain legal provisions which refer to the Agency for money laundering SCCP, a financial police and overall legislation.

  10. Energy supply security in Europe: principles and measures

    International Nuclear Information System (INIS)

    Keppler, J.H.

    2007-01-01

    After having recalled a dozen of reasons for some worries about energy supply security in Europe during the past months (oil price increase, intentional interruption of gas and oil deliveries by Russia respectively to Ukraine and Belarus, creation of a new CO 2 trading scheme, tensions on the European electricity markets, and so on), the author distinguishes and discusses those which are actually a threat to energy supply and those which are not. Then, he proposes a classification of these threats in relationship with the reasons for delivery interruption, production capacity limitation, or price increase. These reasons can be political situations and decisions, technical problems, commercial reasons. Then, the author examines what European policy makers can do to manage these risks and ensure energy supply security. This needs economic as well as political responses, coherence between domestic energy policies and energy supply security, and an efficient foreign policy based on a multilateral approach

  11. Preparing for Beslan: Anti-Terrorism Recommendations for an American School

    Science.gov (United States)

    2008-06-13

    confronting school -shooter situations. Columbine , Jonesboro, and Virginia Tech are not just places of profound sorrow but rallying cries for those advocating...installed physical security mechanisms to protect students during a school shooting incident. However, to secure students from a concerted terrorist...Strategy Forum 2004, 6). Some Manhattan schools were forced to evacuate to sites miles away. Two high schools ’ evacuation plans called for students to

  12. Teaching introductory computer security at a Department of Defense university

    OpenAIRE

    Irvine, Cynthia E.

    1997-01-01

    The Naval Postgraduate School Center for Information Systems Security (INFOSEC) Studies and Research (NPS CISR) has developed an instructional program in computer security. Its objective is to insure that students not only understand practical aspects of computer security associated with current technology, but also learn the fundamental principles that can be applied to the development of systems for which high confidence in policy enforcement can be achieved. Introduction to Computer Sec...

  13. Community Preparedness: Alternative Approaches to Citizen Engagement in Homeland Security

    Science.gov (United States)

    2014-06-01

    and largely ignores the social aspects that influence an individual’s beliefs, attitudes and, behaviors.53 Self-efficacy is defined by Albert Bandura ...master’s thesis Naval Postgraduate School, Monterey, CA), 39–52 53 Ibid., 53. 54 Albert Bandura , “Self-efficacy: Toward a Unifying Theory of...Hometown Security: Advancing the Homeland Security Paradigm, Homeland Security Affairs V (2009). http://www.hsaj.org/?fullarticle=5.2.2. Bandura

  14. Developing a Measure of Traffic Calming Associated with Elementary School Students' Active Transport.

    Science.gov (United States)

    Nicholson, Lisa M; Turner, Lindsey; Slater, Sandy J; Abuzayd, Haytham; Chriqui, Jamie F; Chaloupka, Frank

    2014-12-01

    The objective of this study is to develop a measure of traffic calming with nationally available GIS data from NAVTEQ and to validate the traffic calming index with the percentage of children reported by school administrators as walking or biking to school, using data from a nationally representative sample of elementary schools in 2006-2010. Specific models, with and without correlated errors, examined associations of objective GIS measures of the built environment, nationally available from NAVTEQ, with the latent construct of traffic calming. The best fit model for the latent traffic calming construct was determined to be a five factor model including objective measures of intersection density, count of medians/dividers, count of low mobility streets, count of roundabouts, and count of on-street parking availability, with no correlated errors among items. This construct also proved to be a good fit for the full measurement model when the outcome measure of percentage of students walking or biking to school was added to the model. The traffic calming measure was strongly, significantly, and positively correlated with the percentage of students reported as walking or biking to school. Applicability of results to public health and transportation policies and practices are discussed.

  15. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Directory of Open Access Journals (Sweden)

    Arnon Hershkovitz

    2015-09-01

    Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.

  16. Factor structure of the Essen Climate Evaluation Schema measure of social climate in a UK medium-security setting.

    Science.gov (United States)

    Milsom, Sophia A; Freestone, Mark; Duller, Rachel; Bouman, Marisa; Taylor, Celia

    2014-04-01

    Social climate has an influence on a number of treatment-related factors, including service users' behaviour, staff morale and treatment outcomes. Reliable assessment of social climate is, therefore, beneficial within forensic mental health settings. The Essen Climate Evaluation Schema (EssenCES) has been validated in forensic mental health services in the UK and Germany. Preliminary normative data have been produced for UK high-security national health services and German medium-security and high-security services. We aim to validate the use of the EssenCES scale (English version) and provide preliminary normative data in UK medium-security hospital settings. The EssenCES scale was completed in a medium-security mental health service as part of a service-wide audit. A total of 89 patients and 112 staff completed the EssenCES. The three-factor structure of the EssenCES and its internal construct validity were maintained within the sample. Scores from this medium-security hospital sample were significantly higher than those from earlier high-security hospital data, with three exceptions--'patient cohesion' according to the patients and 'therapeutic hold' according to staff and patients. Our data support the use of the EssenCES scale as a valid measure for assessing social climate within medium-security hospital settings. Significant differences between the means of high-security and medium-security service samples imply that degree of security is a relevant factor affecting the ward climate and that in monitoring quality of secure services, it is likely to be important to apply different scores to reflect standards. Copyright © 2013 John Wiley & Sons, Ltd.

  17. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  18. Challenges of Measuring a Faculty Member Activity in Medical Schools

    OpenAIRE

    Mohammadi, A; Mojtahedzadeh, R; Emami Razavi, S H

    2011-01-01

    Background One of the features of Mission Based Management is measuring the activities of faculty members and departments and their contributions to the school's mission. As it is important to assess the school's readiness for such a system, in this study we assessed the view points of Tehran Medical School's department chairs about faculty members’ activities. Methods We used focus group technique to identify participants' view points. We divided 30 department chairs into homogenous groups o...

  19. Development and initial validation of a measure of work, family, and school conflict.

    Science.gov (United States)

    Olson, Kristine J

    2014-01-01

    This study reports the development and initial validation of a theoretically based measure of conflict between work, family, and college student roles. The measure was developed through the assessment of construct definitions and an assessment of measurement items by subject matter experts. Then, the measurement items were assessed with data from 500 college students who were engaged in work and family responsibilities. The results indicate that conflict between work, family, and school are effectively measured by 12 factors assessing the direction of conflict (e.g., work-to-school conflict, and school-to-work conflict) as well as the form of conflict (i.e., time, strain, and behavior based conflict). Sets of exploratory and confirmatory factor analyses demonstrated that the 12 factors of the new measure are distinct from the 6 factors of the Carlson, Kacmar, and Williams (2000) work-family conflict measure. Criterion validity of the measure was established through a series of regression analyses testing hypothesized relationships between antecedent and outcome variables with role conflict. Results indicate that role demand was a robust predictor of role conflict. To extend the literature, core self-evaluations and emotional stability were established as predictors of role conflict. Further, work, family, and school role satisfaction were significantly impacted with the presence of role conflict between work, family, and school. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  20. Associations between active commuting to school and objectively measured physical activity

    DEFF Research Database (Denmark)

    Børrestad L, Anita Bjørkelund; Ostergaard, Lars; Andersen, Lars Bo

    2013-01-01

    , b) compare moderate vigorous physical activity (MVPA) among children cycling vs. walking to school, and c) thus calculate possible underestimated MVPA, when using accelerometers to measure commuter cycling. Methods: A total of 78 children, average age 11.4 (SD = 0.5), participated in the study....... Physical activity was measured with cycle computers and accelerometers for 4 days. Mode of commuting and demographic information was self-reported in a questionnaire. Results: Children who reported to cycle to school spent significantly more time cycling than those who walked to school, 53.6 (SD = ± 33......Background: To provide more accurate assessment of commuting behavior and potential health effect, it is important to have accurate methods. Therefore, the current study aimed to a) compare questionnaire reported mode of commuting with objectively measured data from accelerometer and cycle computer...

  1. Relationships Among Student, Staff, and Administrative Measures of School Climate and Student Health and Academic Outcomes.

    Science.gov (United States)

    Gase, Lauren N; Gomez, Louis M; Kuo, Tony; Glenn, Beth A; Inkelas, Moira; Ponce, Ninez A

    2017-05-01

    School climate is an integral part of a comprehensive approach to improving the well-being of students; however, little is known about the relationships between its different domains and measures. We examined the relationships between student, staff, and administrative measures of school climate to understand the extent to which they were related to each other and student outcomes. The sample included 33,572 secondary school students from 121 schools in Los Angeles County during the 2014-2015 academic year. A multilevel regression model was constructed to examine the association between the domains and measures of school climate and 5 outcomes of student well-being: depressive symptoms or suicidal ideation, tobacco use, alcohol use, marijuana use, and grades. Student, staff, and administrative measures of school climate were weakly correlated. Strong associations were found between student outcomes and student reports of engagement and safety, while school staff reports and administrative measures of school climate showed limited associations with student outcomes. As schools seek to measure and implement interventions aimed at improving school climate, consideration should be given to grounding these efforts in a multidimensional conceptualization of climate that values student perspectives and includes elements of both engagement and safety. © 2017, American School Health Association.

  2. Interface for safety and security of radioactive sources

    International Nuclear Information System (INIS)

    Seggane, Richard

    2016-04-01

    In facilities and activities involving use of radiation sources, safety and security measures have in common the aim of protecting human life and health and the environment. In addition, safety and security measures must be designed and implemented in an integrated manner, so that security measures do not compromise safety and safety measures do not compromise security measures. This work reviewed issues related to establishing a clear interface between safety and security of radiation sources. The Government, the Regulatory Authority and licensee/registrants and other relevant stakeholders should work together and contribute to ensure that safety and security of sources is ensured and well interfaced. A Radiotherapy facility has been used as a case study. (au)

  3. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  4. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  5. Incorporating spectroscopy and measurement technology into the high school chemistry laboratory

    Science.gov (United States)

    Harbert, Emily Ann

    Science and technology are becoming increasingly important in maintaining a healthy economy at home and a competitive edge on the world stage, though that is just one facet affected by inadequate science education in the United States. Engaging students in the pursuit of knowledge and giving them the skills to think critically are paramount. One small way to assist in achieving these goals is to increase the quality and variety of technology-rich activities conducted in high school classrooms. Incorporating more laboratory measurement technology into high schools may incite more student interest in the processes and practices of science and may allow students to learn to think more critically about their data and what it represents. The first objective of the work described herein was to determine what measurement technology is being used in schools and to what extent, as well as to determine other teacher needs and preferences. Second, the objective was to develop a new program to provide incoming freshmen (or rising seniors) with measurement technology training they did not receive in high school, and expose them to new research and career opportunities in science. The final objective was to create a technology-rich classroom laboratory activity for use in high schools.

  6. Policies and measures for economic efficiency, energy security and environment protection in India

    International Nuclear Information System (INIS)

    Venkaiah, M.; Kaushik, S.C.; Dewangan, M.L.

    2007-01-01

    India needs to sustain 8-10% economic growth to meet energy needs of people below poverty line. India would, at least, need to grow its primary energy supply (3-4 times) of present consumption to deliver a sustained growth of 8% by 2031. This paper discusses India's policies and measures for economic efficiency, environment protection and energy security (3-E). (author)

  7. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  8. Security in an interdependent world. Medford, Massachusetts, 18 May 2003. Statement to the Fletcher School at Tufts University

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    Addressing the members of The Fletcher School Board of Overseers, Director General of the IAEA emphasised the principal actions that will be essential achieve security in an independent world: First, we must modernize and revamp the collective security system of the United Nations Charter - in terms of both preventive diplomacy and enforcement action. To start, the Security Council should be reconstituted to include the major political and economic powers of today's world. In addition, new working concepts, tools and methods are needed to ensure that the Council can effectively discharge its role as the body with 'the primary responsibility' for the maintenance of international peace and security. Second, we must create an environment in which, as foreseen in the UN Charter, the use of force is limited to situations of self-defence or enforcement measures authorized by the Security Council. Preemptive strikes, however tempting, can send the global community into uncharted and dangerous territory. Only an action authorized by the Council will bring international legitimacy and support to such a measure. More importantly, these limitations will restrict the use of force to those situations where force is indeed the last and only alternative. Third, we must take concrete steps to de-legitimize the acquisition or use of weapons of mass destruction. Clearly, a new approach is needed - an approach that applies to all weapons of mass destruction, and would include: universal adherence to conventions that ban such weapons; robust and intrusive systems of verification for all related weapons conventions; a clear road map and the determination to eliminate these weapons in all States, to abolish over time the divide between the nuclear 'haves' and 'have nots'; new doctrines of security that do not rely on the deterrent effect of nuclear weapons; and reliable enforcement measures, under the aegis of the Security Council, to effectively counter efforts by any country to

  9. Developing a Measure of Traffic Calming Associated with Elementary School Students’ Active Transport

    Science.gov (United States)

    Nicholson, Lisa M.; Turner, Lindsey; Slater, Sandy J.; Abuzayd, Haytham; Chriqui, Jamie F.; Chaloupka, Frank

    2014-01-01

    The objective of this study is to develop a measure of traffic calming with nationally available GIS data from NAVTEQ and to validate the traffic calming index with the percentage of children reported by school administrators as walking or biking to school, using data from a nationally representative sample of elementary schools in 2006-2010. Specific models, with and without correlated errors, examined associations of objective GIS measures of the built environment, nationally available from NAVTEQ, with the latent construct of traffic calming. The best fit model for the latent traffic calming construct was determined to be a five factor model including objective measures of intersection density, count of medians/dividers, count of low mobility streets, count of roundabouts, and count of on-street parking availability, with no correlated errors among items. This construct also proved to be a good fit for the full measurement model when the outcome measure of percentage of students walking or biking to school was added to the model. The traffic calming measure was strongly, significantly, and positively correlated with the percentage of students reported as walking or biking to school. Applicability of results to public health and transportation policies and practices are discussed. PMID:25506255

  10. Developing a Comparative Measure of the Learning Climate in Professional Schools

    Science.gov (United States)

    Bowen, Donald D.; Kilmann, Ralph H.

    1975-01-01

    The Learning Climate Questionnaire (LCQ) compares the objective properties of schools with measures of overall student satisfaction. The validity of the instrument suggests its use for substantive research investigations into the organizational dynamics of professional schools. (Author/JR)

  11. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    Science.gov (United States)

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  12. Roles for Schools and School Social Workers in Improving Child Food Security

    Science.gov (United States)

    Fram, Maryah Stella; Frongillo, Edward A.; Fishbein, Eliza M.; Burke, Michael P.

    2014-01-01

    Food insecurity is associated with a range of child developmental, behavioral, and emotional challenges, all of which can inhibit a child's school success. Schools offer a number of formal and informal services aimed at reducing food insecurity, but the problems associated with identifying children in need, addressing issues of stigma, and…

  13. Relationships between Student, Staff, and Administrative Measures of School Climate and Student Health and Academic Outcomes

    Science.gov (United States)

    Gase, Lauren Nichol; Gomez, Louis M.; Kuo, Tony; Glenn, Beth A.; Inkelas, Moira; Ponce, Ninez A.

    2018-01-01

    BACKGROUND School climate is an integral part of a comprehensive approach to improving the wellbeing of students; however, little is known about the relationships between its different domains and measures. This study examined the relationships between student, staff, and administrative measures of school climate in order to understand the extent to which they were related to each other and student outcomes. METHODS The sample included 33,572 secondary school students from 121 schools in Los Angeles County during the 2014–2015 academic year. A multilevel regression model was constructed to examine the association between the domains and measures of school climate and five outcomes of student wellbeing: depressive symptoms or suicidal ideation, tobacco use, alcohol use, marijuana use, and grades. RESULTS Student, staff, and administrative measures of school climate were weakly correlated. Strong associations were found between student outcomes and student reports of engagement and safety, while school staff reports and administrative measures of school climate showed limited associations with student outcomes. CONCLUSIONS As schools seek to measure and implement interventions aimed at improving school climate, consideration should be given to grounding these efforts in a multi-dimensional conceptualization of climate that values student perspectives and includes elements of both engagement and safety. PMID:28382671

  14. Development of security engineering curricula at US universities

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, M.L.

    1998-08-01

    The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.

  15. Measuring the Foundation of Homeland Security

    Science.gov (United States)

    2007-03-01

    Pirak Kevin Eack Susan Pyle Chuck Eaneff Joseph Saitta Susan Fernandez Shelly Schechter Helen Fitzpatrick Rick Schwein Jay...multiple disciplines. The scope of this literature review is to cast a broad net and then narrow to specific literature related to Homeland Security...Suez Canal. His successes as a planner, diplomat and promoter made him the most celebrated man in Europe. Because of these successes, De Lesseps

  16. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  17. Scripting Quality of Security Service (QoSS) Safeguard Measures for the Suggested INFOCON System

    National Research Council Canada - National Science Library

    Guild, Jennifer

    2004-01-01

    .... The focus will be on the security of the DOD information infrastructure and the accomplishment of the mission, as well as the usability and the standardization of the INFOCON warning system. The end result is a prototype that is a set of predefined escalation scripts for the evolved INFOCON system's safeguard measures.

  18. Student Reports of Bullying and Cyber-Bullying: Results from the 2007 School Crime Supplement to the National Crime Victimization Survey. Web Tables. NCES 2011-316

    Science.gov (United States)

    DeVoe, Jill; Murphy, Christina

    2011-01-01

    These Web Tables use data from the 2007 School Crime Supplement (SCS) to the National Crime Victimization Survey (NCVS) to show the relationship between bullying and cyber-bullying victimization and other variables of interest such as the reported presence of gangs, guns, drugs, and alcohol at school; select school security measures; student…

  19. Measuring the Return on Investment of Nuclear Security Training: The Case of the WINS Academy Professional Society

    International Nuclear Information System (INIS)

    Battistella, B.; Howsley, R.; Johnson, D.

    2015-01-01

    The challenges inherent in managing nuclear and radiological materials are complex and growing; ensuring that such materials remain secure requires competent management supported by ongoing training. The nuclear industry is increasingly becoming aware of the need for nuclear security: numerous dedicated training centres have been established worldwide and the IAEA holds approximately 60 international nuclear security training events annually. International training programmes have been conducted in various fields over decades but assessing their value and having the assurance that these training have had a sustainable impact remain difficult. In the field of nuclear security training, no assessment is being made of the degree to which the investment made is making a difference in building sustainable capacity and capability. This paper aims to discuss a methodology to assess the return on investment of nuclear security training. WINS has established a new professional society called the WINS Academy Alumni, for those individuals who have achieved certification through the WINS Academy. This platform proposes a structure, based on established competency frameworks, through which to measure the return on investment and performance improvement of nuclear security training. The objectives of the WINS Academy society are to stay engaged with certified Alumni, track their continued professional development progress, provide them with additional opportunities, and encourage their continued security competence through recertification. We envision that these certified practitioners will in turn promote certification and continual professional development among their peers to help build a network of security-trained professionals that will lead to meaningful and sustainable changes to security culture worldwide. In the long run (5–10 years), we envision that this group will be at the forefront of new professional requirements for nuclear security competence, with

  20. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  1. Validation of the Spanish Version of the School Engagement Measure (SEM).

    Science.gov (United States)

    Ramos-Díaz, Estibaliz; Rodríguez-Fernández, Arantzazu; Revuelta, Lorena

    2016-11-24

    The scientific study of school engagement has recently been the subject of considerable interest in the field of educational psychology, and significant advances have been made in our knowledge of this construct. For instance, there is currently consensus in the scientific community that it is multifaceted, and has three dimensions: behavioral engagement, emotional engagement, and cognitive engagement. However, more advanced statistical analyses are needed to validate Spanish-language measures of school engagement, which this study proposes to do. The sample was comprised of 1,250 adolescents from Basque Country (49% boys, 51% girls) aged 12 to 15 years old (M = 13.72, SD = 1.09). The results of confirmatory factor analysis on the School Engagement Measure (Fredricks, Blumenfeld, Friedel, & Paris, 2005) supported a three-dimensional structure of school engagement (χ2 (100) = 676.93, p satisfactory, ranging from .83 to .94. Adequate evidence of concurrent validity was found for the variable perceived school performance (p < .01). The results are discussed from an educational perspective, and with an eye to future research.

  2. A gender-based analysis of high school athletes using computerized electrocardiogram measurements.

    Directory of Open Access Journals (Sweden)

    Nikhil Kumar

    Full Text Available BACKGROUND: The addition of the ECG to the preparticipation examination (PPE of high school athletes has been a topic for debate. Defining the difference between the high school male and female ECG is crucial to help initiate its implementation in the High School PPE. Establishing the different parameters set for the male and female ECG would help to reduce false positives. We examined the effect of gender on the high school athlete ECG by obtaining and analyzing ECG measurements of high school athletes from Henry M. Gunn High School. METHODS: In 2011 and 2012, computerized Electrocardiograms were recorded and analyzed on 181 athletes (52.5% male; mean age 16.1 ± 1.1 years who participated in 17 different sports. ECG statistics included intervals and durations in all 3 axes (X, Y, Z to calculate 12 lead voltage sums, QRS Amplitude, QT interval, QRS Duration, and the sum of the R wave in V5 and the S Wave in V2 (RS Sum. RESULTS: By computer analysis, we demonstrated that male athletes had significantly greater QRS duration, Q-wave duration, and T wave amplitude. (P<0.05. By contrast, female athletes had a significantly greater QTc interval. (P<0.05. CONCLUSION: The differences in ECG measurements in high school athletes are strongly associated with gender. However, body size does not correlate with the aforementioned ECG measurements. Our tables of the gender-specific parameters can help facilitate the development of a more large scale and in-depth ECG analysis for screening high school athletes in the future.

  3. Students "Hacking" School Computer Systems

    Science.gov (United States)

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  4. Developing a Measure of Traffic Calming Associated with Elementary School Students’ Active Transport

    OpenAIRE

    Nicholson, Lisa M.; Turner, Lindsey; Slater, Sandy J.; Abuzayd, Haytham; Chriqui, Jamie F.; Chaloupka, Frank

    2014-01-01

    The objective of this study is to develop a measure of traffic calming with nationally available GIS data from NAVTEQ and to validate the traffic calming index with the percentage of children reported by school administrators as walking or biking to school, using data from a nationally representative sample of elementary schools in 2006-2010. Specific models, with and without correlated errors, examined associations of objective GIS measures of the built environment, nationally available from...

  5. Characterizing the IPv6 Security Landscape by Large-Scale Measurements

    NARCIS (Netherlands)

    Hendriks, Luuk; Sperotto, Anna; Pras, Aiko

    2015-01-01

    Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are

  6. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  7. Un-"Chartered" Waters: Balancing Montessori Curriculum and Accountability Measures in a Charter School

    Science.gov (United States)

    Scott, Catherine M.

    2017-01-01

    More than 6,000 charter schools exist in the United States, and of these 120 are Montessori charter schools. When studying charter school practices, researchers often examine issues such as performance accountability measures and effectiveness of charter school curricula. In doing so, the outcomes often overlook the challenges for teachers as they…

  8. Conceptualizing energy security

    International Nuclear Information System (INIS)

    Winzer, Christian

    2012-01-01

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy security. They can be characterized according to the sources of risk, the scope of the impacts, and the severity filters in the form of the speed, size, sustention, spread, singularity and sureness of impacts. Using a stylized case study for three European countries, we illustrate how the selection of conceptual boundaries along these dimensions determines the outcome. This can be avoided by more clearly separating between security of supply and other policy objectives. This leads us to the definition of energy security as the continuity of energy supplies relative to demand. - Highlights: ► The widest energy security concept includes all risks that are caused by or have an impact on the energy supply chain. ► Authors narrow this down by choosing different risk sources, impact measures and subjective severity filters in their definitions. ► The selection of conceptual boundaries determines outcome of quantitative studies.

  9. Quality of protection evaluation of security mechanisms.

    Science.gov (United States)

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  10. Quality of Protection Evaluation of Security Mechanisms

    Science.gov (United States)

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  11. Public Schools

    Data.gov (United States)

    Department of Homeland Security — This Public Schools feature dataset is composed of all Public elementary and secondary education in the United States as defined by the Common Core of Data, National...

  12. Building a partnership to evaluate school-linked health services: the Cincinnati School Health Demonstration Project.

    Science.gov (United States)

    Rose, Barbara L; Mansour, Mona; Kohake, Kelli

    2005-12-01

    The Cincinnati School Health Demonstration Project was a 3-year collaboration that evaluated school-linked health services in 6 urban elementary (kindergarten to eighth grade) schools. Partners from the Cincinnati Health Department, Cincinnati Public Schools, Cincinnati Children's Hospital Medical Center, and The Health Foundation of Greater Cincinnati wanted to determine if levels of school-linked care made a difference in student quality of life, school connectedness, attendance, emergency department use, and volume of referrals to health care specialists. School nurses, principals and school staff, parents and students, upper-level managers, and health service researchers worked together over a 2.5-year period to learn about and use new technology to collect information on student health, well-being, and outcome measures. Varying levels of school health care intervention models were instituted and evaluated. A standard model of care was compared with 2 models of enhanced care and service. The information collected from students, parents, nurses, and the school system provided a rich database on the health of urban children. School facilities, staffing, and computer technology, relationship building among stakeholders, extensive communication, and high student mobility were factors that influenced success and findings of the project. Funding for district-wide computerization and addition of school health staff was not secured by the end of the demonstration project; however, relationships among the partners endured and paved the way for future collaborations designed to better serve urban school children in Cincinnati.

  13. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  14. Fluctuations of Internal Transmittance in Security of Measurement-Device-Independent Quantum Key Distribution with an Untrusted Source*

    International Nuclear Information System (INIS)

    Wang Yang; Bao Wan-Su; Chen Rui-Ke; Zhou Chun; Jiang Mu-Sheng; Li Hong-Wei

    2017-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlie’s mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations . (paper)

  15. 'How I Feel About My School': The construction and validation of a measure of wellbeing at school for primary school children.

    Science.gov (United States)

    Allen, Kate; Marlow, Ruth; Edwards, Vanessa; Parker, Claire; Rodgers, Lauren; Ukoumunne, Obioha C; Seem, Edward Chan; Hayes, Rachel; Price, Anna; Ford, Tamsin

    2018-01-01

    There is a growing focus on child wellbeing and happiness in schools, but we lack self-report measures for very young children. Three samples ( N = 2345) were combined to assess the psychometric properties of the How I Feel About My School (HIFAMS) questionnaire, which was designed for children aged 4-8 years. Test-retest reliability was moderate (intraclass correlation coefficient = .62). HIFAMS assessed a single concept and had moderate internal consistency (Cronbach's alpha values from .62 to .67). There were low correlations between scores on the child-reported HIFAMS and parent and teacher reports. Children at risk of exclusion had significantly lower HIFAMS scores than the community sample (mean difference = 2.4; 95% confidence interval (CI) = [1.6, 3.2]; p < .001). Schools contributed only 4.5% of the variability in HIFAMS score, the remaining 95.5% reflecting pupil differences within schools. Girls' scores were 0.37 units (95% CI = [0.16, 0.57]; p < .001) higher than boys, while year group and deprivation did not predict HIFAMS score. HIFAMS is a promising measure that demonstrates moderate reliability and discriminates between groups even among very young children.

  16. Basic security measures for IEEE 802.11 wireless networks

    OpenAIRE

    Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David

    2008-01-01

    This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educat...

  17. 46 CFR 167.05-35 - Public nautical school.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Public nautical school. 167.05-35 Section 167.05-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Definitions § 167.05-35 Public nautical school. The term public nautical school means any school...

  18. Beyond Bullying: Consideration of Additional Research for the Assessment and Prevention of Potential Rampage School Violence in the United States

    Directory of Open Access Journals (Sweden)

    Evonn Welton

    2014-01-01

    Full Text Available For approximately 15 years there have been a number of episodes of rampage school violence in elementary/high school and higher education in the United States. Initial responses included implementation of antibullying programs, disciplinary measures, and increased law security measures. As the incidences have continued, it has become apparent that a more collaborative and interdisciplinary approach is needed for prevention. This paper offers a review of research literature as it applies to proposed innovative strategies for collaborative research, prevention, and intervention in the school setting.

  19. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  20. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  1. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  2. School Shootings in Policy Spotlight

    Science.gov (United States)

    Maxwell, Lesli A.

    2006-01-01

    The three school shootings that left a principal and six students dead in less than a week have sparked a barrage of pledges from national and state political leaders to tighten campus security. School safety experts urged caution against overreacting to the horrific, but rare, incidents in rural schools in Colorado, Pennsylvania, and Wisconsin.…

  3. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  4. Illicit drug consumption in school populations measured by wastewater analysis.

    Science.gov (United States)

    Zuccato, Ettore; Gracia-Lor, Emma; Rousis, Nikolaos I; Parabiaghi, Alberto; Senta, Ivan; Riva, Francesco; Castiglioni, Sara

    2017-09-01

    Analysis of student consumption of illicit drugs (ID) by school population surveys (SPS) provides information useful for prevention, but the results may be influenced by subjective factors. We explored wastewater (WW) analysis to improve the information. We used WW analysis to measure ID consumption in eight secondary schools in Italy in 2010-13 (students aged 15-19). Samples were collected from the sewage pipes of the schools during lessons for one week each year. Samples were analysed by mass spectrometry to measure ID and consumption by students was compared to that of the general population. We found THCCOOH (human metabolite of THC) concentrations in 2010 indicating significant consumption of cannabis in all the schools and benzoylecgonine (human metabolite of cocaine) suggesting a limited consumption of cocaine in all but one school. Morphine was only found in traces, and amphetamine, methamphetamine, ecstasy, ketamine and mephedrone were not detectable. Repeated analysis showed cannabis stable until 2012 with increases in 2013, low cocaine and morphine levels, and none of the other ID. WW analysis suggested that students used amounts of cannabis comparable to the general population, with low, sporadic use of cocaine and opioids, but excluded the use of significant amounts of amphetamine, methamphetamine, ecstasy, ketamine and mephedrone. WW analysis was useful to confirm SPS figures and provides complementary findings for effective prevention strategies. This is the first time WW analysis has been used to investigate consumption of a large number of ID and new psychoactive substances (NPS) in schools. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Social Security Measures for Elderly Population in Delhi, India: Awareness, Utilization and Barriers.

    Science.gov (United States)

    Kohli, Charu; Gupta, Kalika; Banerjee, Bratati; Ingle, Gopal Krishna

    2017-05-01

    World population of elderly is increasing at a fast pace. The number of elderly in India has increased by 54.77% in the last 15 years. A number of social security measures have been taken by Indian government. To assess awareness, utilization and barriers faced while utilizing social security schemes by elderly in a secondary care hospital situated in a rural area in Delhi, India. A cross-sectional study was conducted among 360 individuals aged 60 years and above in a secondary care hospital situated in a rural area in Delhi. A pre-tested, semi-structured schedule prepared in local language was used. Data was analysed using SPSS software (version 17.0). Chi-square test was used to observe any statistical association between categorical variables. The results were considered statistically significant if p-value was less than 0.05. A majority of study subjects were females (54.2%), Hindu (89.7%), married (60.3%) and were not engaged in any occupation (82.8%). Awareness about Indira Gandhi National Old Age Pension Scheme (IGNOAPS) was present among 286 (79.4%) and Annapurna scheme in 193 (53.6%) subjects. Among 223 subjects who were below poverty line, 179 (80.3%) were aware of IGNOAPS; while, 112 (50.2%) were utilizing the scheme. There was no association of awareness with education status, occupation, religion, family type, marital status and caste (p>0.05). Corruption and tedious administrative formalities were major barriers reported. Awareness generation, provision of information on how to approach the concerned authority for utilizing the scheme and ease of administrative procedures should be an integral part of any social security scheme or measure. In the present study, about 79.4% of elderly were aware and 45% of the eligible subjects were utilizing pension scheme. Major barriers reported in utilization of schemes were corruption and tedious administrative procedures.

  6. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  7. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  8. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    Science.gov (United States)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  9. Hate Speech in a Juvenile Male Prison School and in US Schooling

    Science.gov (United States)

    Vaught, Sabina E.

    2012-01-01

    This article theoretically examines the meaning and function of hate speech in a high-security juvenile male prison school. Specifically, the article draws on data from an ethnographic study of this prison school site in order to map the institutional mechanisms of hate speech. Additionally, the article suggests these mechanisms are not anomalous…

  10. High-resolution measurements of face-to-face contact patterns in a primary school.

    Directory of Open Access Journals (Sweden)

    Juliette Stehlé

    Full Text Available BACKGROUND: Little quantitative information is available on the mixing patterns of children in school environments. Describing and understanding contacts between children at school would help quantify the transmission opportunities of respiratory infections and identify situations within schools where the risk of transmission is higher. We report on measurements carried out in a French school (6-12 years children, where we collected data on the time-resolved face-to-face proximity of children and teachers using a proximity-sensing infrastructure based on radio frequency identification devices. METHODS AND FINDINGS: Data on face-to-face interactions were collected on Thursday, October 1(st and Friday, October 2(nd 2009. We recorded 77,602 contact events between 242 individuals (232 children and 10 teachers. In this setting, each child has on average 323 contacts per day with 47 other children, leading to an average daily interaction time of 176 minutes. Most contacts are brief, but long contacts are also observed. Contacts occur mostly within each class, and each child spends on average three times more time in contact with classmates than with children of other classes. We describe the temporal evolution of the contact network and the trajectories followed by the children in the school, which constrain the contact patterns. We determine an exposure matrix aimed at informing mathematical models. This matrix exhibits a class and age structure which is very different from the homogeneous mixing hypothesis. CONCLUSIONS: We report on important properties of the contact patterns between school children that are relevant for modeling the propagation of diseases and for evaluating control measures. We discuss public health implications related to the management of schools in case of epidemics and pandemics. Our results can help define a prioritization of control measures based on preventive measures, case isolation, classes and school closures, that

  11. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  12. Measuring up to the Model: A Ranking of State Public Charter School Laws. Ninth Annual Edition

    Science.gov (United States)

    Ziebarth, Todd; Palmer, Louann Bierlein

    2018-01-01

    This ninth edition of "Measuring up to the Model: A Ranking of State Charter School Laws" presents the latest activity in charter public school legislation across the country. For the second year in a row, the 2018 rankings measure each state's charter school law against the National Alliance's updated model charter school law, "New…

  13. Improving DNS security : a measurement-based approach

    NARCIS (Netherlands)

    van Rijswijk-Deij, Roland

    2017-01-01

    The Domain Name System (DNS) is a vital part of the core infrastructure of the Internet. It maps human readable names (such as www.example.com) to machine readable information (such as 93.184.216.34). This thesis studies two aspects of the DNS. First, it studies problems in the DNS Security

  14. reCAPTCHA: human-based character recognition via Web security measures.

    Science.gov (United States)

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  15. Measuring Entrepreneurship in Business Schools

    Science.gov (United States)

    Hazeldine, Mary; Miles, Morgan

    2007-01-01

    The recent positions of the Association to Advance Collegiate Schools of Business (AACSB) and the European Foundation for Management Developments (EQUIS) on the value of entrepreneurship suggest a more entrepreneurial perspective in a business school's culture and strategic processes for obtaining and sustaining a business school's reputation. The…

  16. 46 CFR 167.05-25 - Nautical school ship.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Nautical school ship. 167.05-25 Section 167.05-25 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Definitions § 167.05-25 Nautical school ship. The term nautical school ship means a vessel operated by or in connection with a nautical school...

  17. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  18. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  19. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  20. School Climate Measurement and Analysis

    Science.gov (United States)

    Faster, Darlene; Lopez, Daisy

    2013-01-01

    Today, school climate assessment has become an increasingly important and valued aspect of district, state, and federal policy. Recognizing that effective school climate improvement efforts are grounded in valid and reliable data, the Federal Department of Education launched the Safe and Supportive Schools grant in 2010 to provide 11 states with…

  1. Present state and problems of the measures for securing stable supply of uranium resources

    International Nuclear Information System (INIS)

    Yoneda, Fumishige

    1982-01-01

    The long-term stable supply of uranium resources must be secured in order to accelerate the development and utilization of nuclear power in Japan. All uranium required in Japan is imported from foreign countries, and depends on small number of suppliers. On the use of uranium, various restrictions have been imposed by bilateral agreements from the viewpoint of nuclear non-proliferation policy. At present, the demand-supply relation in uranium market is not stringent, but in the latter half of 1980s, it is feared that it will be stringent. The prospect of the demand and supply of uranium resources, the state of securing uranium resources, the present policy on uranium resources, the necessity of establishing the new policy, and the active promotion of uranium resource measures are described. The measures to be taken are the promotion of exploration and development of mines, the participation in the management of such foreign projects, the promotion of diversifying the supply sources, the establishment of the structure to accept uranium resources, the promotion of the storage of uranium, and the rearrangement of general coordination and promotion functions for uranium resource procurement. (Kako, I.)

  2. The Arab Uprisings and Euro-Mediterranean Security: The Regional Security Agenda of the European Union

    Directory of Open Access Journals (Sweden)

    Schima Viktoria Labitsch

    2014-12-01

    Full Text Available The 2010 Arab uprisings led to profound changes in the political landscape of the Southern Mediterranean, and came at a time of staggering Euro-Mediterranean relations. With prevailing turmoil and violence in Europe’s closest proximity, the Euromed relationship – heavily dominated by security objectives and concerns in the past – is facing new social, political and economic challenges. This work analyses what challenges have made it onto the security agenda of the European Union in response to the uprisings in Tunisia, Libya and Egypt between December 2010 and 2013. It does so by analysing the discourse of three institutions: the European Commission, the European Council and the Council of Ministers. Accordingly, it argues that security in the Euro-Mediterranean context may be analysed in the framework of the wider constructivist Copenhagen school of security studies, treating threats as politically constructed in the process of securitization. It emphasizes the different degrees of institutional involvement in framing the regional security agenda, and the vast application of security logic to migration and mobility as well as its absence in areas of biological and chemical weapons, extremism and weapons of mass destruction. This work’s final argument is that whilst the overall level of securitization throughout the three years remains low and partially inconsistent with the security priorities before 2010, the EU exhibited a particularly strong regional focus on Libya as well as a thematic one on migration and external borders.

  3. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  4. Materials for the information security education

    International Nuclear Information System (INIS)

    Yashiro, Shigeo; Aoki, Kazuhisa; Sato, Tomohiko; Tanji, Kazuhiro

    2014-01-01

    With the rapid progress of the utilization of Information Technology (IT), IT infrastructure (network environment and information system) became crucial as a lifeline for promoting business. At the same time, changes in the circumstances surrounding the IT infrastructure globalize the threat of cyber attacks and increase the risk of the information security such as unlawful access to an information system, viral infection, an alteration of a website, disclosure of subtlety information, destruction of an information system and so on. Information security measure is an important issue in Japan Atomic Energy Agency (JAEA). In order to protect the information property of JAEA from the threat, Center for Computational Science and e-Systems (CCSE) has been taking triadic measures for information security: (1) to lay down a set of information security rules, (2) to introduce security equipments to backbone network and (3) to provide information security education. This report is a summary of the contents of the information security education by e-learning. (author)

  5. School Library Supplement. Putting Your Library Automation System to Work [and] Using Videodiscs in Research Projects [and] Library Security: What to Look For [and] Expanding Library/Media Services with Media Retrieval [and] How to Network CD-ROMs (and) The School Library Resource Directory.

    Science.gov (United States)

    Karpisek, Marian; And Others

    1995-01-01

    Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…

  6. Evaluating Factors of Security Policy on Information Security Effectiveness in Developing Nations: A Case of Nigeria

    Science.gov (United States)

    Okolo, Nkiru Benjamin

    2016-01-01

    Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…

  7. Indicators of School Crime Safety, 2000.

    Science.gov (United States)

    Kaufman, Phillip; Chen, Xianglei; Choy, Susan P.; Ruddy, Sally A.; Miller, Amanda K.; Fleury, Jill K.; Chandler, Kathryn A.; Rand, Michael R.; Klaus, Patsy; Planty, Michael

    Providing the latest data, this report on school safety presents a mixed picture: while overall crime has declined, violence, gangs, and drugs remain at some schools. Victimization at school declined from 1995-99, though rates for fighting and weapon threats remain steady. Students seem more secure, and gang activity decreased; however, in grades…

  8. Who Is Eligible for Free School Meals? Characterising Free School Meals as a Measure of Disadvantage in England

    Science.gov (United States)

    Gorard, Stephen

    2012-01-01

    This paper presents a description of the background characteristics and attainment profile of pupils eligible for free school meals (FSM) in England, and of those missing a value for this variable. Free school meal eligibility is a measure of low parental income, widely used in social policy research as an individual indicator of potential…

  9. Nuclear security measures at the XV Pan American Games: Rio de Janeiro 2007

    International Nuclear Information System (INIS)

    2009-03-01

    The objective of this report is to describe the nuclear security arrangements established and implemented for the Rio 2007 Games. (Nuclear security is taken to mean the prevention, detection and interdiction of malicious acts involving nuclear or other radioactive material and the response to such acts should they occur.) These arrangements may serve as an example of the arrangements that need to be made for Member States hosting major public events in the future. The information is intended for use by national authorities such as counter terrorism agencies, national radiation measurement and assessment institutions, bomb squad, police and other relevant law enforcement agencies. Section 1 comprises an introduction about the report's background, objective, scope and structure. Section 2 provides a description of the arrangements made during the preparatory phase: the overall security concept; the evaluation of the threat; the policy decisions taken; the organizational arrangements; the nuclear security plan; and the cooperation with the IAEA. Section 3 describes the concept of operations: the strategy for choosing the targets to be protected; the different lines of defence; the coordination and management of activities; and the actions to be taken to prevent, detect, interdict and respond to malicious acts and other unauthorized acts involving nuclear or other radioactive material. Section 4 covers the logistics including the radiation detection instruments used, their deployment, testing and maintenance and training in their use. Section 5 presents the results of the surveys undertaken prior to the Rio 2007 Games and of the access controls of the venues during the Rio 2007 Games. Section 6 provides the conclusions that may be drawn from the work undertaken. Section 7 gives recommendations to other national authorities facing similar challenge in the future

  10. Building a Better Measure of School Quality: A New Framework for Measuring School Quality Represents a Fuller Picture of What People Care about in a School

    Science.gov (United States)

    Schneider, Jack; Jacobsen, Rebecca; White, Rachel; Gehlbach, Hunter

    2017-01-01

    When it comes to measuring the quality of a school, policy leaders tend to embrace standardized tests as the go-to indicator, whereas parents and community members tend to rely on reputation, word-of-mouth, and what they perceive with their own eyes. The authors suggest a better approach: a new framework that looks at three categories of inputs…

  11. Computer Security: Computer security threats, vulnerabilities and attacks (3/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Antonio Perez Perez works in the Computer Security Team doing software development, sysadmin tasks and operations. He is also involved on grid security and does 1st line security support at CERN on ROTA. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have shown several successful attacks against e.g. Sony, PBS, UNESCO, RSAsecurity, Citibank, and others. Credit card information of hundreds of thousands of people got exposed. Affected companies not only lost their assets and data, also their reputation has suffered. Thus, proper computer security measures are essential. Without question, security must even more become an inherent ingredient when developing, deploying, and operating applications, web sites, and computing services. These lectures shall give an ove...

  12. Active Shooter Response: Defensive Tactics And Tactical Decision Making For Elementary School Teachers And Staff

    Science.gov (United States)

    2017-12-01

    17 A.  HISTORY OF SCHOOL SHOOTINGS ...............................................17  B.  NEED FOR CHANGE ...tactical scenarios—teachers and school staff, for example—might have difficulty implementing the model when faced with multiple and changing variables. For... International School Safety and Security Council, ed. Robin Hattersley (Alexandria, VA: ASIS International School Safety and Security Council, 2016), 53

  13. Measurement procedure to assess exposure to extremely low-frequency fields: A primary school case study

    International Nuclear Information System (INIS)

    Alonso, A.; Bahillo, A.; De la Rosa, R.; Carrera, A.; Duran, R. J.; Fernandez, P.

    2012-01-01

    How to correctly measure the exposure of general public to extremely low-frequency (ELF) radiation is a key issue for ELF epidemiological studies. This paper proposes a measurement procedure to accurately assess the exposure of people to electric and magnetic field in the frequency band from 5 Hz to 100 kHz in buildings and their premises. As ELF radiation could be particularly harmful to children, the measurement procedure is focused on exposure to ELF in schools. Thus, the students' exposure to ELF fields can be assessed by correlating the ELF measurements to the hours of school activity. In this paper, the measurement protocol was applied to study the ELF exposure on students from Garcia Quintana primary school in Valladolid, Spain. The campaign of measurements for ELF exposure assessment in this primary school was of great interest for the Regional Council of Public Health because of the social alarm generated by the presence of a significant number cancer cases in children. (authors)

  14. How best to measure implementation of school health curricula: a comparison of three measures.

    Science.gov (United States)

    Resnicow, K; Davis, M; Smith, M; Lazarus-Yaroch, A; Baranowski, T; Baranowski, J; Doyle, C; Wang, D T

    1998-06-01

    The impact of school health education programs is often attenuated by inadequate teacher implementation. Using data from a school-based nutrition education program delivered in a sample of fifth graders, this study examines the discriminant and predictive validity of three measures of curriculum implementation: class-room observation of fidelity, and two measures of completeness, teacher self-report questionnaire and post-implementation interview. A fourth measure, obtained during teacher observations, that assessed student and teacher interaction and student receptivity to the curriculum (labeled Rapport) was also obtained. Predictive validity was determined by examining the association of implementation measures with three study outcomes; health knowledge, asking behaviors related to fruit and vegetables, and fruit and vegetable intake, assessed by 7-day diary. Of the 37 teachers observed, 21 were observed for two sessions and 16 were observed once. Implementation measures were moderately correlated, an indication of discriminant validity. Predictive validity analyses indicated that the observed fidelity, Rapport and interview measures were significantly correlated with post-test student knowledge. The association between health knowledge and observed fidelity (based on dual observation only), Rapport and interview measures remained significant after adjustment for pre-test knowledge values. None of the implementation variables were significantly associated with student fruit and vegetable intake or asking behaviors controlling for pre-test values. These results indicate that the teacher self-report questionnaire was not a valid measure of implementation completeness in this study. Post-implementation completeness interviews and dual observations of fidelity and Rapport appear to be more valid, and largely independent methods of implementation assessment.

  15. 46 CFR 173.051 - Public nautical school ships.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Public nautical school ships. 173.051 Section 173.051 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY SPECIAL RULES PERTAINING TO VESSEL USE School Ships § 173.051 Public nautical school ships. Each public nautical school...

  16. Improving Food and Nutrition Security in the Philippines through ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Improving food and nutrition security in the Philippines through school ... Implementation of the Community Health Assessment Program in the Philippines ... This project will address the effects of fast-paced economic growth in the Greater ...

  17. Adverse health effects of experiencing food insecurity among Greenlandic school children

    DEFF Research Database (Denmark)

    Niclasen, B.; Petzold, M.; Schnohr, C. W.

    2013-01-01

    Background. In vulnerable populations, food security in children has been found to be associated with negative health effects. Still, little is known about whether the negative health effects can be retrieved in children at the population level. Objective. To examine food insecurity reported...... by Greenlandic school children as a predictor for perceived health, physical symptoms and medicine use. Design. The study is based on the Greenlandic part of the Health Behavior in School-aged Children survey. The 2010 survey included 2,254 students corresponding to 40% of all Greenlandic school children...... in Grade 5 through 10. The participation rate in the participating schools was 65%. Food insecurity was measured as going to bed or to school hungry because there was no food at home. Results. Boys, the youngest children (11-12 year-olds), and children from low affluence homes were at increased risk...

  18. Whole body measurements in Bavarian school children

    International Nuclear Information System (INIS)

    Schmier, H.; Berg, D.

    1992-12-01

    On behalf of the Bavarian State Ministry for State Development and Environmental Affairs measurements were conducted using the whole body counters at the Institute for Radiation Hygiene (of the Federal Office for Radiation Protection), and the Institute for Radiation Biology (of the GSF Research Centre for Environment and Health). Between September 1988 and July 1990 about 1600 school children from all over Bavaria were investigated for incorporated radiocesium. The aim of these measurements was to evaluate the whole body activity due to regionally differing soil contaminations in Bavaria following the accident in the nuclear power plant in Chernobyl and to assess the effective dose from an intake of radionuclides for the pupils by comparing the results of their WBC measurements with those of reference groups of children which underwent WBC examinations at regular intervals at both institutes since the middle of the year 1986. The results of the WBC measurements of those pupils who had not eaten mushrooms in the days before the measurement are in good agreement with the results of comparative measurements in children living in the regions of Munich and Frankfurt-am-Main. Based on these results an effective dose of 0,2 mSv for the Munich region children and of 0,1 mSv for Nothern Bavarian children can be derived. For children living in the highest contaminated region of Bavaria, i.e. the counties adjacent to the Alps, no comparable reference group results are available, but the amount of incorporated radiocesium is only twice that for pupils in the Munich region. The mean value for the specific activity of radiocesium in South Bavarian school children who consumed mushrooms was found to be twice the value of pupils who did not. This is also true for that group of children whose parents had bought allegedly low contaminated foodstuffs. Other effecs of nutrition habits on the specific whole body activity could not be found. (orig.) [de

  19. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  20. Parental Attachment and Adolescents' Perception of School Alienation: The Mediation Role of Self-Esteem and Adjustment.

    Science.gov (United States)

    Kocayörük, Ercan; Şimşek, Ömer Faruk

    2016-01-01

    The present study examined the relationship between adolescents' attachment to parents and their feelings of alienation in the school context by considering the mediating role of adjustment and self-esteem. It was proposed that the degree of attachment to one's parents was associated with adjustment and self-esteem, which in turn predicted possible school alienation. A total of 227 students completed self-report measures on parental attachment, adjustment, self-esteem, and alienation from school. Results were consistent with the attachment theory and related literature that posits that (a) secure attachment to parents was associated with adjustment and self-esteem, (b) secure attachment to parents was negatively associated with feelings of school alienation, and (c) adjustment and self-esteem were a crucial mediators between attachment to parents and school alienation. In addition to enhanced adjustment, the self-esteem of adolescents may be an additional factor in reducing alienation at school. The results also supported the mediator role of self-esteem in the relationship between attachment to parents and adjustment. Finally, the relationship between self-esteem and school alienation were shown to be fully mediated by adjustment. The results were discussed in the context of responsibilities of teachers and school counselors, which may provide both students and parents with the skills to improve social functioning in the school context.

  1. Effect of integrated school-based nutrition education on optimal dietary practices and nutritional status of school adolescents in Southwest of Ethiopia: a quasi-experimental study.

    Science.gov (United States)

    Tamiru, Dessalegn; Argaw, Alemayehu; Gerbaba, Mulusew; Ayana, Girmay; Nigussie, Aderajew; Belachew, Tefera

    2016-12-15

    Malnutrition and infection are major barriers to educational access and achievement in low-income countries and also work in conjunction with each other in deteriorating wellness and productivity of school adolescents. A quasi-experimental design was used to evaluate the effectiveness of school-based nutrition education using a peer-led approach, health promotion through school media and health clubs. Data were collected at baseline, midline and end line from sampled participants. To account for the effect of time trend, the difference was measured using a repeated measure analysis. Variables that have p≤0.25 in the bivariate analyses were entered into multivariables to determine the independent effect of interventions. There is a significant difference in food variety between food secure and insecure households (pschools (pschools, which positively associated with male gender (AOR=4.13, CI: 2.38, 7.15) and having a middle-income family (AOR=2.93, CI: 1.92, 6.15). This study showed that by integrating a dietary intervention into school-based activities, there might be significant improvements in dietary intake of primary school adolescents. Therefore, school-based nutrition education programs should be a part of comprehensive school health programs to reach the students and potentially their families.

  2. 46 CFR 168.10-5 - Civilian nautical school.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Civilian nautical school. 168.10-5 Section 168.10-5 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS CIVILIAN NAUTICAL SCHOOL VESSELS Definitions of Terms Used in This Part § 168.10-5 Civilian nautical school. The term civilian...

  3. Development of the school organisational health questionnaire: a measure for assessing teacher morale and school organisational climate.

    Science.gov (United States)

    Hart, P M; Wearing, A J; Conn, M; Carter, N L; Dingle, R K

    2000-06-01

    A growing body of empirical evidence suggests that organisational factors are more important than classroom specific issues in determining teacher morale. Accordingly, it is necessary to have available measures that accurately assess morale, as well as the organisational factors that are likely to underpin the experience of morale. Three studies were conducted with the aim of developing a psychometrically sound questionnaire that could be used to assess teacher morale and various dimensions of school organisational climate. A total of 1,520 teachers from 18 primary and 26 secondary schools in the Australian state of Victoria agreed to participate in three separate studies (N = 615, 342 and 563 in Studies 1, 2 and 3, respectively) that were used to develop the questionnaire. The demographic profile of the teachers was similar to that found in the Department as a whole. All teaching staff in the participating schools were asked to complete a self-report questionnaire as part of the evaluation of an organisational development programme. A series of exploratory and confirmatory factor analyses were used to establish the questionnaire's factor structure, and correlation analyses were used to examine the questionnaire's convergent and discriminant validity. The three studies resulted in the 54-item School Organisational Health Questionnaire that measures teacher morale and 11 separate dimensions of school organisational climate: appraisal and recognition, curriculum coordination, effective discipline policy, excessive work demands, goal congruence, participative decision-making, professional growth, professional interaction, role clarity, student orientation, and supportive leadership.

  4. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  5. [Gymnastic school sport injuries--aspects of preventive measures].

    Science.gov (United States)

    Knobloch, K; Jagodzinski, M; Haasper, C; Zeichen, J; Krettek, C

    2006-06-01

    Gymnastic school sport injuries account for a significant morbidity and mortality among children and adolescents. Preventive issues may be derived from a thorough in-depth analysis of the pattern and circumstances of gymnastic injuries. During a school year among 3993 schools in 43 889 classes with 993 056 pupils 2234 school sport injuries have been reported to the Gemeinde Unfall Versicherung (GUV) Niedersachsen, Germany. Gymnastic sport injuries account for 18 % (403 accidents), which is second after ball sports injuries. Regarding the distribution of the gymnastic disciplines, vault was the major discipline with 34 %, followed by floor exercise (21.3 %), mini- and competition trampoline (16.8 %), and parallel bars (8.2 %). The analysis of the type of injury during vault accidents revealed contusion (31 %) as the predominant injury, followed by sprains (15.4 %), and fractures (15.4 %). Floor exercise injuries distributed among distorsions (26.7 %), contusions (18.6 %), muscle tears (14 %). Back injuries especially of the cervical and thoracic spine, accounted for 40 % of all their injuries. Minor head injuries account for 4.7 % of all floor exercise injuries. Mini-trampoline injuries distribute among contusions (30 %), fractures (22.5 %), distorsions (7.5 %). 21.8 % collisions were noted against a box in comparison to 6.8 % in case of the horse. Gymnast injuries account for a significant number of all school sport related injuries. Vault and floor exercise account for the vast majority of all injuries, with alarming high numbers of spine injuries during floor exercise and mini-trampoline. A preservation of a high level of attention during a sport lesson, safety measures including appropriate mats and landing zones are mandatory to reduce injuries. Muscle injuries and ankle sprains can be prevented by a prospective proprioceptive training intervention to be implemented in school sports.

  6. impact of boko haram insurgency on human security in nigeria

    African Journals Online (AJOL)

    abduction and killing of people; destruction of houses, schools, health care centres, churches, mosques and farms has ... KEYWORDS: Boko Haram, Insurgency, Human Security, Violence, Nigeria ..... Provide the citizens with adequate ...

  7. Measuring parent perceptions of school climate.

    Science.gov (United States)

    Schueler, Beth E; Capotosto, Lauren; Bahena, Sofía; McIntyre, Joseph; Gehlbach, Hunter

    2014-03-01

    Parents' attitudes about their children's schools matter. Their views can shape their children's attitudes about school, affect their levels of family-school engagement, and influence their residential and school enrollment decisions. In this article, we describe the development of a survey scale to assess parent perceptions of the climate of their child's school. Our comprehensive scale development process incorporated feedback from academics and potential respondents from the outset of the design process to enhance scale quality. We conducted 3 studies with national samples of parents (n = 385; n = 253; n = 266) to gather evidence of scale score reliability and valid score inferences based on convergent and discriminant validity. Through confirmatory factor analysis, we identified a theoretically grounded factor structure that fit the data well but found no evidence that parental response patterns distinguish between academic and social elements of school climate. Furthermore, we found that parents of younger children, on average, had a more positive perception of the school's climate than did parents of older children. We conclude by discussing how researchers and Pre-K-12 schools and districts can use the scale to aid school improvement efforts. 2014 APA

  8. A Study of the Stability of School Effectiveness Measures across Grades and Subject Areas.

    Science.gov (United States)

    Mandeville, Garrett K.; Anderson, Lorin W.

    School effectiveness indices (SEIs), based on regressing test performance onto earlier test performance and a socioeconomic status measure, were obtained for eight subject-grade combinations from 485 South Carolina elementary schools. The analysis involved school means based on longitudinally matched student data. Reading and mathematics…

  9. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  10. Supporting Applications Development and Operation Using IT Security and Audit Measures

    Directory of Open Access Journals (Sweden)

    Katalin Szenes

    2012-01-01

    Full Text Available The market success of the enterprises depends on the ability to support their business processes. This involves the requirement of a seamless, well-ordered operation of the whole company. Operation is greatly affected by the quality of its IT support. The information should be available, handled confidentially, preserving its integrity, have to be processed in a reliable, efficient, effective way, in compliance with the requirements of supervisory authorities. Extending the scope of these information criteria to criteria determining operations quality and adding two business-level requirements to them makes possible to find preventive, detective andcorrective, originally information security control measures, raised to the level of operational quality, that support the market success of the institutions.

  11. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  12. Large-scale CO2 measurement campaigns in Danish schools

    DEFF Research Database (Denmark)

    Clausen, Geo; Toftum, Jørn; Bekö, Gabriel

    2016-01-01

    In two large measurement campaigns performed in 2009 and 2014 more than 1500 spot measurements of CO2 were made by pupils in Danish primary school classes. In 2009 56% of the measurements exceeded the recommended value of 1000 ppm CO2. This percentage had increased to 60% in 2014. Changing the be...

  13. Stagecoach Theatre Schools: England's Franchised Musical Theatre Training.

    Science.gov (United States)

    Heinig, Ruth Beall

    2001-01-01

    Describes how a student at Stagecoach (a private arts school), by securing the lead role in the film "Billy Elliot," encouraged other British boys to enroll in ballet and dance classes as well as Stagecoach Theatre Arts Schools. Present locations and international links for Stagecoach schools. Describes how the Stagecoach schools are run…

  14. Outcomes and Suggestions of the Nuclear Security Summit

    International Nuclear Information System (INIS)

    Kim, Jae San; Jung, Myung Tak

    2014-01-01

    Through The third Nuclear Security Summit (NSS), the measurement for the nuclear security has become more strengthening and participating countries could recognize the importance of nuclear security than before. From the NSS sessions, the leaders of participating countries and international organizations (IAEA, UN, EU and INTERPOL) had an in-depth discussion about the seriousness of the nuclear terrorism, the urgency issues for strengthening the nuclear security, etc. What issues was discussed in NSS processes since 2010 and which facts become more important than ever for nuclear security? The purpose of this paper is to provide the substantive outcomes from the 1st to 3rd NSS and suggestions for consolidating the next NSS. The summit process has helped strengthen the nuclear security measures. In the following two years before 4th NSS, there will be various follow-up activities for making an effort to implementing national commitments, joint statement, continuous outreach with IAEA/UN and agreed measures in Hague. It should produce the substantial measures for enhancing the nuclear security that are aimed to the each country. And preemptively, it is necessary to understand the each nuclear security level by using the concrete questionnaire sheets substitute for the national progress report

  15. Outcomes and Suggestions of the Nuclear Security Summit

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jae San; Jung, Myung Tak [Korea Institute of Nuclear Nonproliferation and Control Daejeon (Korea, Republic of)

    2014-10-15

    Through The third Nuclear Security Summit (NSS), the measurement for the nuclear security has become more strengthening and participating countries could recognize the importance of nuclear security than before. From the NSS sessions, the leaders of participating countries and international organizations (IAEA, UN, EU and INTERPOL) had an in-depth discussion about the seriousness of the nuclear terrorism, the urgency issues for strengthening the nuclear security, etc. What issues was discussed in NSS processes since 2010 and which facts become more important than ever for nuclear security? The purpose of this paper is to provide the substantive outcomes from the 1st to 3rd NSS and suggestions for consolidating the next NSS. The summit process has helped strengthen the nuclear security measures. In the following two years before 4th NSS, there will be various follow-up activities for making an effort to implementing national commitments, joint statement, continuous outreach with IAEA/UN and agreed measures in Hague. It should produce the substantial measures for enhancing the nuclear security that are aimed to the each country. And preemptively, it is necessary to understand the each nuclear security level by using the concrete questionnaire sheets substitute for the national progress report.

  16. Interrelationship between nuclear safety, safeguards and nuclear security

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2007-01-01

    As preventive activities against danger within nuclear systems, three major areas exist; nuclear safety, safeguards and nuclear security. Considering the purpose of these activities, to prevent non-peaceful use is common in nuclear security in general and safeguards. At the same time, measures against sabotage, one of the subcategory in nuclear security, is similar to nuclear safety in aiming at preventing nuclear accidents. When taking into account the insider issues in nuclear security, the distinction between measures against sabotage and nuclear safety becomes ambiguous. Similarly, the distinction between measures against theft, another subcategory in nuclear security, and safeguards also becomes vague. These distinctions are influenced by psychological conditions of members in nuclear systems. Members who have the intention to make nuclear systems dangerous to human society shall be the 'enemy' to nuclear systems and thus be the target for nuclear security. (author)

  17. Measuring global water security towards sustainable development goals

    NARCIS (Netherlands)

    Wada, Y.|info:eu-repo/dai/nl/341387819; Gain, A.K.; Giupponi, C.

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals(SDGs). Many international river basins are likely to experience ‘low water

  18. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  19. Unique contributions of dynamic versus global measures of parent-child interaction quality in predicting school adjustment.

    Science.gov (United States)

    Bardack, Sarah; Herbers, Janette E; Obradović, Jelena

    2017-09-01

    This study investigates the unique contribution of microsocial and global measures of parent-child positive coregulation (PCR) in predicting children's behavioral and social adjustment in school. Using a community sample of 102 children, ages 4-6, and their parents, we conducted nested path analytic models to identify the unique effects of 2 measures of PCR on school outcomes. Microsocial PCR independently predicted fewer externalizing and inattention/impulsive behaviors in school. Global PCR did not uniquely relate to children's behavioral and social adjustment outcomes. Household socioeconomic status was related to both microsocial and global measures of PCR, but not directly associated with school outcomes. Findings illustrate the importance of using dynamic measures of PCR based on microsocial coding to further understand how the quality of parent-child interaction is related to children's self-regulatory and social development during school transition. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. Newer Technologies for School Security. ERIC Digest Number 145.

    Science.gov (United States)

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  1. How Insecurity impacts on school attendance and school drop out among urban slum children in Nairobi

    Directory of Open Access Journals (Sweden)

    Chimaraoke Izugbara

    2008-06-01

    Full Text Available This paper discusses how perceptions of personal security can impact on school enrolment and attendance. It mainly focuses on threats of physical harm, crime, and community and domestic violence. These security fears can include insecurity that children suffer from as they go to school, maybe through the use of unsafe routes; insecurity that children feel at school; and the insecurity they suffer from in their homes. Although poverty can be a source and/or an indicator of insecurity, this paper does not focus solely on poverty as it is well covered elsewhere in the literature. The paper relies on qualitative data col- lected in Korogocho and Viwandani slum areas in Nairobi, Kenya between October and November 2004. The paper analyses data from individual interviews and focus group interviews and focuses on the narrative of slum dwellers on how insecurity impacts on educational attainment. The conclusion in this paper is that insecure neighbourhoods may have a negative impact on schooling. As a result policies that address insecurity in slum neighbourhoods can also improve school attendance and performance.

  2. Cyber Security Analysis of Turkey

    OpenAIRE

    Senturk, Hakan; Çil, Zaim; Sağıroğlu, Şeref

    2016-01-01

    Considering the criticality of the cyber security threat in the 21st century, it is presumed that the nations are busy with series of activities in order to protect their security in the cyber space domain. In this paper, in light of the recent developments in the cyber security field, Turkey’s cyber security analysis is performed using a macro analysis model. We researched for the measures taken in Turkey with respect to those in the other countries, reviewed the posture, the activities and ...

  3. Measurements of Radiofrequency Radiation with a Body-Borne Exposimeter in Swedish Schools with Wi-Fi

    Directory of Open Access Journals (Sweden)

    Lena K. Hedendahl

    2017-11-01

    Full Text Available IntroductionWireless access to the Internet is now commonly used in schools. Many schools give each student their own laptop and utilize the laptops and wireless fidelity (Wi-Fi connection for educational purposes. Most children also bring their own mobile phones to school. Since children are obliged by law to attend school, a safe environment is important. Lately, it has been discussed if radiofrequency (RF radiation can have long-term adverse effects on children’s health.MethodThis study conducted exposimetric measurements in schools to assess RF emissions in the classroom by measuring the teachers’ RF exposure in order to approximate the children’s exposure. Teachers in grades 7–12 carried a body-borne exposimeter, EME-Spy 200, in school during 1–4 days of work. The exposimeter can measure 20 different frequency bands from 87 to 5,850 MHz.ResultsEighteen teachers from seven schools participated. The mean exposure to RF radiation ranged from 1.1 to 66.1 µW/m2. The highest mean level, 396.6 µW/m2, occurred during 5 min of a lesson when the teacher let the students stream and watch YouTube videos. Maximum peaks went up to 82,857 µW/m2 from mobile phone uplink.DiscussionOur measurements are in line with recent exposure studies in schools in other countries. The exposure levels varied between the different Wi-Fi systems, and if the students were allowed to use their own smartphones on the school’s Wi-Fi network or if they were connected to GSM/3G/4G base stations outside the school. An access point over the teacher’s head gave higher exposure compared with a school with a wired Internet connection for the teacher in the classroom. All values were far below International Commission on Non-Ionizing Radiation Protection’s reference values, but most mean levels measured were above the precautionary target level of 3–6 µW/m2 as proposed by the Bioinitiative Report. The length of time wireless devices are used is an

  4. Ethical Decision-Making for Homeland Security

    Science.gov (United States)

    2013-09-01

    PhD Thesis Co-Advisor Anders Strindberg, PhD Thesis Co-Advisor Mohammed Hafez, PhD Chair, Department of National Security Affairs...expectations may be deleterious in the long-term, emotionally, psychologically , spiritually , and socially (what we label as moral injury)” (Litz 2009). They...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited ETHICAL DECISION

  5. 33 CFR 101.405 - Maritime Security (MARSEC) Directives.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.405 Maritime... necessary to respond to a threat assessment or to a specific threat against the maritime elements of the...

  6. Measurement of Ethnic Background in Cross-national School Surveys

    DEFF Research Database (Denmark)

    Jensen, Helene Nordahl; Krølner, Rikke; Páll, Gabrilla

    2011-01-01

    Indicators such as country of birth and language spoken at home have been used as proxy measures for ethnic background, but the validity of these indicators in surveys among school children remains unclear. This study aimed at comparing item response and student-parent agreement on four questions...

  7. Measurement and structural relations of an authoritative school climate model: A multi-level latent variable investigation.

    Science.gov (United States)

    Konold, Timothy R; Cornell, Dewey

    2015-12-01

    This study tested a conceptual model of school climate in which two key elements of an authoritative school, structure and support variables, are associated with student engagement in school and lower levels of peer aggression. Multilevel multivariate structural modeling was conducted in a statewide sample of 48,027 students in 323 public high schools who completed the Authoritative School Climate Survey. As hypothesized, two measures of structure (Disciplinary Structure and Academic Expectations) and two measures of support (Respect for Students and Willingness to Seek Help) were associated with higher student engagement (Affective Engagement and Cognitive Engagement) and lower peer aggression (Prevalence of Teasing and Bullying) on both student and school levels of analysis, controlling for the effects of school demographics (school size, percentage of minority students, and percentage of low income students). These results support the extension of authoritative school climate model to high school and guide further research on the conditions for a positive school climate. Copyright © 2015 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.

  8. Information security management with ITIL V3

    CERN Document Server

    Cazemier, Jacques A; Peters, Louk

    2010-01-01

    This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers:Fundamentals of information security ? providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors.Fundamentals of management of information security - explains what information security manageme

  9. Subjective Sleepiness and Sleep Quality in Adolescents are Related to Objective and Subjective Measures of School Performance.

    NARCIS (Netherlands)

    Boschloo, A.; Krabbendam, L.; Dekker, S.; Lee, N.; Groot, R. de; Jolles, J.

    2013-01-01

    This study investigated the relation between sleep and school performance in a large sample of 561 adolescents aged 11-18 years. Three subjective measures of sleep were used: sleepiness, sleep quality, and sleep duration. They were compared to three measures of school performance: objective school

  10. Family Food Security and Children’s Environment: A Comprehensive Analysis with Structural Equation Modeling

    OpenAIRE

    Che Wan Jasimah bt Wan Mohamed Radzi; Huang Hui; Nur Anisah Binti Mohamed @ A. Rahman; Hashem Salarzadeh Jenatabadi

    2017-01-01

    Structural Equation Modeling (SEM) has been used extensively in sustainability studies to model relationships among latent and manifest variables. This paper provides a tutorial exposition of the SEM approach in food security studies and introduces a basic framework based on family food security and children’s environment sustainability. This framework includes family food security and three main concepts representing children’s environment, including children’s BMI, health, and school perfor...

  11. Methodology of the Auditing Measures to Civil Airport Security and Protection

    Directory of Open Access Journals (Sweden)

    Ján Kolesár

    2016-10-01

    Full Text Available Airports similarly to other companies are certified in compliance with the International Standardization Organization (ISO standards of products and services (series of ISO 9000 Standards regarding quality management, to coordinate the technical side of standardizatioon and normalization at an international scale. In order for the airports to meet the norms and the certification requirements as by the ISO they are liable to undergo strict audits of quality, as a rule, conducted by an independent auditing organization. Focus of the audits is primarily on airport operation economics and security. The article is an analysis into the methodology of the airport security audit processes and activities. Within the framework of planning, the sequence of steps is described in line with the principles and procedures of the Security Management System (SMS and starndards established by the International Standardization Organization (ISO. The methodology of conducting airport security audit is developed in compliance with the national programme and international legislation standards (Annex 17 applicable to protection of civil aviation against acts of unlawful interference.

  12. Adverse health effects of experiencing food insecurity among Greenlandic school children

    Directory of Open Access Journals (Sweden)

    Birgit Niclasen

    2013-08-01

    Full Text Available Background. In vulnerable populations, food security in children has been found to be associated with negative health effects. Still, little is known about whether the negative health effects can be retrieved in children at the population level. Objective. To examine food insecurity reported by Greenlandic school children as a predictor for perceived health, physical symptoms and medicine use. Design. The study is based on the Greenlandic part of the Health Behaviour in School-aged Children survey. The 2010 survey included 2,254 students corresponding to 40% of all Greenlandic school children in Grade 5 through 10. The participation rate in the participating schools was 65%. Food insecurity was measured as going to bed or to school hungry because there was no food at home. Results. Boys, the youngest children (11–12 year-olds, and children from low affluence homes were at increased risk for food insecurity. Poor or fair self-rated health, medicine use last month and physical symptoms during the last 6 months were all more frequent in children reporting food insecurity. Controlling for age, gender and family affluence odds ratio (OR for self-rated health was 1.60 (95% confidence interval (CI 1.23–2.06 (p<0.001, for reporting physical symptoms 1.34 (95% CI 1.06–1.68 (p=0.01 and for medicine use 1.79 (95% CI 1.42–2.26 (p<0.001. Stratification on age groups suggested that children in different age groups experience different health consequences of food insecurity. The oldest children reported food insecurity less often and experienced less negative health effects compared to the younger children. Conclusions. All 3 measures of health were negatively associated to the occurrence of food insecurity in Greenlandic school children aged 11–17. Food security must be seen as a public health issue of concern, and policies should be enforced to prevent food poverty particularly among boys, younger school children and children from low affluence

  13. A Research Agenda for Security Engineering

    Directory of Open Access Journals (Sweden)

    Rich Goyette

    2013-08-01

    Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific

  14. Circle of Security in Child Care: Putting Attachment Theory into Practice in Preschool Classrooms

    Science.gov (United States)

    Cooper, Glen; Hoffman, Kent; Powell, Bert

    2017-01-01

    This article describes the Circle of Security-Classroom (COS-C) approach to applying attachment theory in preschool settings. Early childhood is an incubator for a wide range of development including the underpinnings of school readiness. Secure teacher-child relationships support this process. However, most preschool staff members lack guidance…

  15. Subjective sleepiness and sleep quality in adolescents are related to objective and subjective measures of school performance

    NARCIS (Netherlands)

    Boschloo, Annemarie; Krabbendam, Lydia; Dekker, Sanne; Lee, Nikki; De Groot, Renate; Jolles, Jelle

    2016-01-01

    This study investigated the relation between sleep and school performance in a large sample of 561 adolescents aged 11–18 years. Three subjective measures of sleep were used: sleepiness, sleep quality, and sleep duration. They were compared to three measures of school performance: objective school

  16. Subjective sleepiness and sleep quality in adolescents are related to objective and subjective measures of school performance

    NARCIS (Netherlands)

    Boschloo, Annemarie; Krabbendam, Lydia; Dekker, Sanne; Lee, Nikki; De Groot, Renate; Jolles, Jelle

    2018-01-01

    This study investigated the relation between sleep and school performance in a large sam- ple of 561 adolescents aged 11–18 years. Three subjective measures of sleep were used: sleepiness, sleep quality, and sleep duration. They were compared to three measures of school performance: objective school

  17. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    published books and peer reviewed journal articles. The Congressional Research Service being the key source on congressional procedure and theory ...Transportation Committee 1 Senate Homeland Security & Governmental Affairs Committee 15 Senate Small Business & Entrepreneurship 1 Senate Special...military contracting procedures in a war zone are not necessarily oversight of national security functions, reviews of FEMA contracting practices

  18. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  19. Security Sector Reform in Albania

    OpenAIRE

    Abazi, Enika; Bumci, Aldo; Hide, Enri; Rakipi, Albert

    2009-01-01

    International audience; This paper analyses security sector reform (SSR) in Albania. In all its enterprises in reforming the security sector,Albania is assisted by different initiatives and projects that provide expertise and financial support. To assesswhether reforms improved the overall security environment (national and human) of the country, it is necessaryto measure the effectiveness of the various initiatives and projects. This is gauged by how well the initiatives andprojects achieved...

  20. The Road Less Traveled: Exploring the Experiences and Successes of Women Leaders in Homeland Security

    Science.gov (United States)

    2013-03-01

    SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL March 2013 Author: Jonna West Approved by...local agencies with homeland security related agencies. For purposes of this study , agencies included the U.S. DHS and its component agencies, state...circles. In fact, often when the topic does come up, it is generally followed by discussions about feminism in general, and is often accompanied by

  1. Security, at what cost? A stated preference approach toward understanding individuals' privacy and civil liberties trade-offs regarding security measures

    NARCIS (Netherlands)

    Robinson, N.; Potoglou, D.

    2010-01-01

    In the presently heightened security environment there are a number of examples of policy that must strike a delicate balance between strengthening security without jeopardising public liberties and personal privacy. The introduction of national identity cards and biometric passports, the expansion

  2. Food safety security: a new concept for enhancing food safety measures.

    Science.gov (United States)

    Iyengar, Venkatesh; Elmadfa, Ibrahim

    2012-06-01

    The food safety security (FSS) concept is perceived as an early warning system for minimizing food safety (FS) breaches, and it functions in conjunction with existing FS measures. Essentially, the function of FS and FSS measures can be visualized in two parts: (i) the FS preventive measures as actions taken at the stem level, and (ii) the FSS interventions as actions taken at the root level, to enhance the impact of the implemented safety steps. In practice, along with FS, FSS also draws its support from (i) legislative directives and regulatory measures for enforcing verifiable, timely, and effective compliance; (ii) measurement systems in place for sustained quality assurance; and (iii) shared responsibility to ensure cohesion among all the stakeholders namely, policy makers, regulators, food producers, processors and distributors, and consumers. However, the functional framework of FSS differs from that of FS by way of: (i) retooling the vulnerable segments of the preventive features of existing FS measures; (ii) fine-tuning response systems to efficiently preempt the FS breaches; (iii) building a long-term nutrient and toxicant surveillance network based on validated measurement systems functioning in real time; (iv) focusing on crisp, clear, and correct communication that resonates among all the stakeholders; and (v) developing inter-disciplinary human resources to meet ever-increasing FS challenges. Important determinants of FSS include: (i) strengthening international dialogue for refining regulatory reforms and addressing emerging risks; (ii) developing innovative and strategic action points for intervention {in addition to Hazard Analysis and Critical Control Points (HACCP) procedures]; and (iii) introducing additional science-based tools such as metrology-based measurement systems.

  3. Examining the Psychometric Properties of the Turkish Version of the Parent School Climate Survey and Measuring of Parents’ Perceptions of School Climate by Gender

    OpenAIRE

    Bugay, Aslı; Avcı, Dilek; Özdemir, Selçuk

    2018-01-01

    The studyinvestigated the psychometric properties of the Turkish version of the ParentSchool Climate Survey. The survey was developed by Haynes, Emmons and Comer(1994) to measure the school adaptation and the quality of student-adultrelationship. The scale consists of eight sub-dimensions: academic focus,achievement motivation, attention and sensitivity of school director,collaborative decision-making, parent participation, school building,school-community relationship, and student-teacher re...

  4. [School meals: planning, production, distribution, and adequacy].

    Science.gov (United States)

    Issa, Raquel Carvalho; Moraes, Letícia Freitas; Francisco, Raquel Rocha Jabour; dos Santos, Luana Caroline; dos Anjos, Adriana Fernandez Versiani; Pereira, Simone Cardoso Lisboa

    2014-02-01

    To evaluate the planning, production, distribution, and nutritional adequacy of meals served at city schools. This descriptive cross-sectional study was conducted between March 2011 and April 2012 and included a representative sample (n = 42 schools) of extended shift city schools from Belo Horizonte, Minas Gerais, Brazil. Five meals from each school were randomly selected and analyzed by direct weighing. Production indicators and nutritional adequacy were evaluated in contrast to the recommendations of the city food security bureau and the Brazilian National Program of School Meals (PNAE). Seventy-nine percent of the analyzed meals did not meet the recommendations of the city food security bureau. The rate of waste (food left on plates) was acceptable at 4,90%, but the rates of cooked and not served food (7,06%) and counter leftovers (5,30%) were high. Both the city planned meals and the meals served in the schools were nutritionally inadequate in terms of the PNAE, particularly for children aged 11-15 years. There was a relationship between consumption by school staff and the amount of food that was cooked (r = 0.353; P planning, production, and distribution of school meals and of food and nutrition education in order to improve the quality of food and to reduce waste in schools.

  5. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  6. Android Applications Security

    OpenAIRE

    Paul POCATILU

    2011-01-01

    The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the a...

  7. Gas markets and security of supply

    International Nuclear Information System (INIS)

    Gibot, G.

    1997-01-01

    In the natural gas business, some European states and companies seem to be concerned by security of supply. Security of supply for a governmental organisation is discussed, to share the author's conception and experience. The targets of a security of supply policy and the measures that can be set are described. The possible changes in implementing this policy are considered, according to recent developments in the field of gas security. The specificity of European gas markets justify the concern in security of supply, as concluded the Commission and the IEA. The integration of national gas markets in Europe will give new opportunities for managing this security of supply. (R.P.)

  8. Economic security, 1935-85.

    Science.gov (United States)

    Reno, V P; Grad, S

    1985-12-01

    The economic well-being of both working and retired persons has improved significantly since the Social Security Act was passed in 1935. More people are employed now than at any time since then, despite declining employment among the aged and more years of school attendance among the young. The ratio of non-workers to workers--a broad measure of dependency--is lower now than at any time since the 1930's. Social security has grown and matured to become a strong foundation of retirement income, and other work-related employee benefits have grown in tandem with social security. Employer contributions for social insurance and related employee benefits have grown from being about a 1-percent supplement to aggregate wages and salaries in 1929 to nearly 20 percent today. Social security and Medicare account for just over a fourth of employer contributions, while other public and private retirement systems represent just over another fourth. The balance of benefits for active workers includes group health and life insurance, unemployment insurance, workers' compensation, temporary disability insurance, and related benefits. Pay for holidays, vacations, and sick leave is estimated to have increased from less than 1 percent of aggregate pay in 1929 to about 10 percent today. The improved economic status of the aged has been documented by a series of surveys beginning in 1941-42 and carried out from time to time until 1972 and biennially since 1976. The earlier surveys were supplemented with estimates from record data and tables from the Bureau of the Census. The income of the aged as a whole has grown by about 75 percent over the past 2 decades after taking inflation into account. The income of the aged as a whole grew faster than that of the nonaged in the 1970's and early 1980's when real social security benefits increased faster than inflation and wages lagged behind it. New beneficiaries in 1982 were in better health and were more likely to retire because they wanted to

  9. Nuclear energy and the security of energy supply

    International Nuclear Information System (INIS)

    Bertel, E.

    2005-01-01

    Security of energy supply was a major concern for OECD governments in the early 1970. Since then, successive oil crises, volatility of hydrocarbon prices, as well as terrorist risks and natural disasters, have brought the issue back to the centre stage of policy agendas. In this paper, the author discusses the problem of energy supply security. Can security of supply be measured? What is the role of government and of nuclear energy? And what are measures for ensuring security of supply? (A.L.B.)

  10. SEADE: Countering the Futility of Network Security

    Science.gov (United States)

    2015-10-01

    guards, and computer cages) and logical security measures (network firewall and intrusion detection). However, no matter how many layers of network...security built-in and with minimal security dependence on network security appliances (e.g., firewalls ). As Secretary of Defense Ashton Carter...based analysis that assumes nothing bad will happen to applications/data if those defenses prevent malware transactions at the entrance. The

  11. Children and adolescents facing a continuous security threat: Aggressive behavior and post-traumatic stress symptoms.

    Science.gov (United States)

    Nuttman-Shwartz, Orit

    2017-07-01

    There is extensive research evidence indicating that children and youth are the most vulnerable population for developing psychological symptoms relating to war and terror. Although studies have documented a wide range of detrimental emotional and behavioral effects of such exposure, much less is known about the effects of exposure to a continuous security threat for children and adolescents. Against this background, the current article examined the implications of continuous exposure to missile attacks among 1096 children and adolescents enrolled in public schools near the Israeli border with Gaza. Participants filled out quantitative questionnaires, which relate to the pathological consequences of continuous exposure to security threats, and to the role of the school and the community as a protective environment against disruptive behavior resulting from such exposure. The findings revealed that PTSS responses were mainly related to the security threat, whereas interpersonal aggression resulted from other types of traumatic events. Significant differences were found between aggression and posttraumatic symptoms, by age and gender. PTSS was found to be lower for older participants and higher for girls, whereas aggression was higher for boys and higher for older participants. Furthermore, the sense of belonging to the place of residence was negatively associated with PTSS as well as with aggressive behavior: the higher the participants' sense of belonging, the lower their levels of PTSS and aggressive responses. In contrast, the sense of belonging to the school was negatively associated only with aggressive behavior: the higher the participants' sense of belonging to the school, the lower their aggressive responses. The findings are discussed in the light of trauma theories and in light of the results of previous research. The study contributed to knowledge about the differential consequences of exposure to a security threat, and highlighted the importance of

  12. Care and supportive measures in school-aged children with prenatal substance exposure.

    Science.gov (United States)

    Sandtorv, Lisbeth B; Haugland, Siren; Elgen, Irene

    2017-12-01

    Prenatal exposure to substances, including alcohol, opiates, and a number of illicit drugs, may have a negative impact on fetal development. Studies have shown that substance exposure can influence a child's neurodevelopment and the need for care and supportive measures. In this study, we aimed to investigate the care status and the level of supportive measures in school-aged children prenatally exposed to alcohol and other substances. This study included children aged between 6 and 14 years who were referred to Haukeland University Hospital in Norway with developmental impairment and a history of prenatal substance exposure. Participants were classified according to their main prenatal exposure to either alcohol or other substances. Information on care status and supportive measures was obtained from medical records and participants' caregivers. We also compared the use of supportive measures for children placed into foster care before and after 1 year of age. A total of 111 (87% of 128 referrals) eligible children participated in the study. Of these 111 children, 96 (86%) were in foster care, of whom 29 (30%) were placed into foster care during their first year of life and 83 out of 90 (92%) had supportive measures, including reinforced foster care and school or social support. A high proportion of the sample lived in foster care and received supportive measures. Findings may reflect an increased need of care and support in school-aged children with prenatal substance exposure, highlighting the importance of awareness among caregivers and public agencies.

  13. Door Locking Options in Schools

    Science.gov (United States)

    National Clearinghouse for Educational Facilities, 2009

    2009-01-01

    Doors serve a variety of needs and purposes in schools: (1) Exterior doors provide building security and protection from the elements; and (2) Interior doors control the movement of people among school spaces, help control noise and air flow, and act as flame and smoke barriers during a fire. In a lockdown, they serve as safety barriers. From a…

  14. Food Insecurity and Its Association With School Absenteeism Among Rural School Adolescents in Jimma Zone, Ethiopia.

    Science.gov (United States)

    Tamiru, Dessalegn; Melaku, Yabsira; Belachew, Tefera

    2017-03-01

    Studies showed that poor health and nutrition among school adolescents are major barriers to educational access and achievements in low-income countries. This school-based study was aimed to assess the association of school absenteeism and food insecurity among rural school adolescents from grades 5 to 8 in Jimma zone, Ethiopia. Regression analyses were used to see the strength of association between dependent and independent variables using odds ratio and 95% confidence intervals. Multivariable logistic regression analysis was used to identify the predictor of school absenteeism. Validated tools are used to collect household food insecurity data. Results showed that school absenteeism is significantly high among adolescents from food insecure households when compared to adolescents from food secure households ( P absenteeism was negatively associated with male sex (adjusted odds ratio [AOR] = -0.91, 95% CI -1.85 to -0.03), household food security (adjusted odds ratio = -1.85, 95% CI -3.11 to -0.59), being an elder sibling (AOR = -0.37, 95% CI, -0.62 to -0.12), and mother involvement in decision making (AOR = -0.68, 95% CI, -1.33 to -0.03) while male-headed household was positively associated (AOR = 2.46, 95% CI, 1.37 to 4.56). Generally, this study showed that household food insecurity has significant contribution to school absenteeism among rural adolescents. Therefore, efforts should be made to improve household income earning capacity to reduce the prevalence of school absenteeism among rural school adolescents.

  15. Household food insecurity and its association with school absenteeism among primary school adolescents in Jimma zone, Ethiopia.

    Science.gov (United States)

    Tamiru, Dessalegn; Argaw, Alemayehu; Gerbaba, Mulusew; Ayana, Girmay; Nigussie, Aderajew; Belachew, Tefera

    2016-08-17

    Household food insecurity and lack of education are two of the most remarkable deprivations which developing countries are currently experiencing. Evidences from different studies showed that health and nutrition problems are major barriers to educational access and achievement in low-income countries which poses a serious challenge on effort towards the achieving Sustainable Development Goals. Evidence on the link between food security and school attendance is very important to address this challenge. This study aimed to assess to what extent food insecurity affects school absenteeism among primary school adolescents. A school based cross-sectional study was conducted among primary school adolescents in Jimma zone from October-November, 2013. Structured questionnaire was used to collect data on the household food security and socio-demographic variables. Data were analyzed using SPSS for windows version 16.0 after checking for missing values and outliers. Multivariable logistic regression analyses were used to determine the association of school absenteeism and food insecurity with independent variables using odds ratio and 95 % of confidence intervals. Variables with p ≤ 0.25 in the bivariate analyses were entered into a multivariable regression analysis to control for associations among the independent variables. The frequency of adolescent school absenteeism was significantly high (50.20 %) among food insecure households (P absenteeism. Household food insecurity was positively associated with lack of maternal education [AOR = 2.26 (0.57, 8.93)] and poor household economic status [AOR = 1.39 (1.18, 2.83)]. However, livestock ownership [AOR = 0.17 (0.06, 0.51)] was negatively associated with household food insecurity. Findings of this study showed that household food insecurity has strong linkage with adolescent school absenteeism. Maternal education and household economic status were significantly associated with household food security

  16. Kinematic Measures of Imitation Fidelity in Primary School Children

    Science.gov (United States)

    Williams, Justin H. G.; Casey, Jackie M.; Braadbaart, Lieke; Culmer, Peter R.; Mon-Williams, Mark

    2014-01-01

    We sought to develop a method for measuring imitation accuracy objectively in primary school children. Children imitated a model drawing shapes on the same computer-tablet interface they saw used in video clips, allowing kinematics of model and observers' actions to be directly compared. Imitation accuracy was reported as a correlation reflecting…

  17. Measuring ICT Use and Contributing Conditions in Primary Schools

    Science.gov (United States)

    Vanderlinde, Ruben; Aesaert, Koen; van Braak, Johan

    2015-01-01

    Information and communication technology (ICT) use became of major importance for primary schools across the world as ICT has the potential to foster teaching and learning processes. ICT use is therefore a central measurement concept (dependent variable) in many ICT integration studies. This data paper presents two datasets (2008 and 2011) that…

  18. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  19. GIS measured environmental correlates of active school transport: A systematic review of 14 studies

    Directory of Open Access Journals (Sweden)

    Faulkner Guy

    2011-05-01

    Full Text Available Abstract Background Emerging frameworks to examine active school transportation (AST commonly emphasize the built environment (BE as having an influence on travel mode decisions. Objective measures of BE attributes have been recommended for advancing knowledge about the influence of the BE on school travel mode choice. An updated systematic review on the relationships between GIS-measured BE attributes and AST is required to inform future research in this area. The objectives of this review are: i to examine and summarize the relationships between objectively measured BE features and AST in children and adolescents and ii to critically discuss GIS methodologies used in this context. Methods Six electronic databases, and websites were systematically searched, and reference lists were searched and screened to identify studies examining AST in students aged five to 18 and reporting GIS as an environmental measurement tool. Fourteen cross-sectional studies were identified. The analyses were classified in terms of density, diversity, and design and further differentiated by the measures used or environmental condition examined. Results Only distance was consistently found to be negatively associated with AST. Consistent findings of positive or negative associations were not found for land use mix, residential density, and intersection density. Potential modifiers of any relationship between these attributes and AST included age, school travel mode, route direction (e.g., to/from school, and trip-end (home or school. Methodological limitations included inconsistencies in geocoding, selection of study sites, buffer methods and the shape of zones (Modifiable Areal Unit Problem [MAUP], the quality of road and pedestrian infrastructure data, and school route estimation. Conclusions The inconsistent use of spatial concepts limits the ability to draw conclusions about the relationship between objectively measured environmental attributes and AST. Future

  20. Audit for Information Systems Security

    Directory of Open Access Journals (Sweden)

    Ana-Maria SUDUC

    2010-01-01

    Full Text Available The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they support. In spite of significant advances in the information security area many information systems are still vulnerable to inside or outside attacks. The existence of an internal audit for information system security increases the probability of adopting adequate security measures and preventing these attacks or lowering the negative consequences. The paper presents an exploratory study on informatics audit for information systems security.

  1. 12 CFR 208.61 - Bank security procedures.

    Science.gov (United States)

    2010-01-01

    ... procedures for opening and closing for business and for the safekeeping of all currency, negotiable...; the cost of the security devices; other security measures in effect at the banking office; and the... directors on the implementation, administration, and effectiveness of the security program. (e) Reserve...

  2. Applications for cyber security - System and application monitoring

    International Nuclear Information System (INIS)

    Marron, J. E.

    2006-01-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  3. The economic security of power plants

    Directory of Open Access Journals (Sweden)

    Niedziółka Dorota

    2017-01-01

    Full Text Available Currently, power plants in Poland have to work in a very uncomfortable situation. Unstable market conditions and frequent changes in the law may have serious adverse consequences for their economic security. Power plants play a very important role in the economy. The effectiveness of their performance affects the activity of all other businesses. Therefore, it is very important to provide a definition of economic security for the power plants’ sector and the factors determining its level. Maintaining economic security will allow energy generation companies to grow in a sustainable way as well as limit operational risk. A precise definition can also be used to create analytical tools for economic security measurement and monitoring. Proper usage of such tools can help energy generation companies sustain their economic security and properly plan their capital expenditures. The article focuses on the definition of economic security in the “micro” context of a separate business unit (enterprise. We also present an analytical model that measures economic security of a company engaged in the production of energy - a company of strategic importance for the national economy. The model uses macroeconomic variables, variables describing prices of raw material and legal / political stability in the country, as well as selected financial indicators. The appliance of conclusions resulting from the model’s implementation will help provide economic security for companies generating energy.

  4. Credit Card Security

    OpenAIRE

    G.C., Anup

    2013-01-01

    Author: Anup G.C. Year: 2013 Subject of thesis: Credit Card Security Number of pages: 36+2 Credit Card is a widely used electronic chip for easy transactions. The main purpose of the report was to show the security measures of transaction by credit cards. The purpose was to give information about credit cards and how they were introduced. The thesis reportcontained the types of card theft with examples and sited the various protocols used for online ...

  5. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  6. 49 CFR 1548.19 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... aviation, TSA issues a Security Directive setting forth mandatory measures. (1) Each indirect air carrier... Security Directive that TSA issues to it, within the time prescribed in the Security Directive for...

  7. Nutritional status and food consumption patterns of primary school ...

    African Journals Online (AJOL)

    South Africa is regarded as food secure; however, food insecurity and malnutrition are still affecting school-aged children residing mostly in rural areas. This paper reports the nutritional status and consumption patterns of school children from two purposively selected schools located in Orange Farm informal settlement.

  8. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  9. Measuring household food security: the global experience A medida da segurança alimentar: a experiência mundial

    Directory of Open Access Journals (Sweden)

    Hugo Melgar-Quinonez

    2008-08-01

    Full Text Available Measuring household food insecurity represents a challenge due to the complexity and wide array of factors associated with this phenomenon. For over one decade, researchers and agencies throughout the world have been using and assessing the validity of variations of the United States Department of Agriculture Household Food Security Supplemental Module. Thanks to numerous studies of diverse design, size, and purpose, the Household Food Security Supplemental Module has shown its suitability to directly evaluate the perceptions of individuals on their food security status. In addition, challenges and limitations are becoming clearer and new research questions are emerging as the process advances. The purpose of this article is to describe the development, validation procedures, and use of the Household Food Security Supplemental Module in very diverse settings. The most common Household Food Security Supplemental Module related studies have been conducted using criterion validity, Rasch modeling and Cronbach-Alpha Coefficient. It is critical that researchers, policy makers, governmental and non-governmental agencies intensify their efforts to further develop tools that provide valid and reliable measures of food security in diverse population groups. Additional work is needed to synthesize a universally applicable tool able to capture the global human phenomenon of food insecurity.Medir a insegurança alimentar domiciliar representa um desafio devido à complexidade e ao vasto número de fatores associados a este fenômeno. Por mais de uma década, pesquisadores e agências em todo o mundo têm usado o Módulo Suplementar da Segurança Alimentar Domiciliar , do Departamento de Agricultura dos Estados Unidos (Household Food Security Supplemental Module, e avaliado suas variações. Graças a numerosos estudos com diversos formatos, extensões e propósitos, a adequação do Household Food Security Supplemental Module para avaliar diretamente a

  10. Defense Logistics Agency Computer-Aided Acquisition and Logistics Support Security Measures

    Science.gov (United States)

    1989-09-29

    sopisit ftre a nduate eiromensweaonsyte dt i vaiou mdi, nfrrngcls- having security features commensurate with today’s weapon system data in various media ...sections, ministrator that has completed an accredited three areas of improvement in security emphasis are APscrt orebfr htst a ecn deemed appropriate...May 1989, been in a hardcopy media and in accordance with Washington, D.C. specific contract clauses and FAR/DFAR. Through CALS, the Government shall

  11. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  12. Redefining interrelationship between nuclear safety, nuclear security and safeguards

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2011-01-01

    Since the beginning of this century, the so-called 3Ss (Nuclear Safety, Nuclear Security and Safeguards) have become major regulatory areas for peaceful uses of nuclear energy. The importance of the 3Ss is now emphasized to countries which are newly introducing nuclear power generation. However, as role models for those newcomers, existing nuclear power countries are also required to strengthen their regulatory infrastructure for the 3Ss. In order to rationalize the allocation of regulatory resources, interrelationship of the 3Ss should be investigated. From the viewpoint of the number of the parties concerned in regulation, nuclear security is peculiar with having 'aggressors' as the third party. From the viewpoint of final goal of regulation, nuclear security in general and safeguards share the goal of preventing non-peaceful uses of nuclear energy, though the goal of anti-sabotage within nuclear security is rather similar to nuclear safety. As often recognized, safeguards are representative of various policy tools for nuclear non-proliferation. Strictly speaking, it is not safeguards as a policy tool but nuclear non-proliferation as a policy purpose that should be parallel to other policy purposes (nuclear safety and nuclear security). That suggests 'SSN' which stands for Safety, Security and Non-proliferation is a better abbreviation rather than 3Ss. Safeguards as a policy tool should be enumerated along with nuclear safety regulation, nuclear security measures and trade controls on nuclear-related items. Trade controls have been playing an important role for nuclear non-proliferation. These policy tools can be called 'SSST' in which Trade controls are also emphasized along with Safety regulation, Security measures and Safeguards. Recently, it becomes quite difficult to clearly demarcate these policy tools. As nuclear security concept is expanding, the denotation of nuclear security measures is also expanding. Nuclear security measures are more and more

  13. Validity Evidence for the Measurement of the Strength of Motivation for Medical School

    Science.gov (United States)

    Kusurkar, Rashmi; Croiset, Gerda; Kruitwagen, Cas; ten Cate, Olle

    2011-01-01

    The Strength of Motivation for Medical School (SMMS) questionnaire is designed to determine the strength of motivation of students particularly for medical study. This research was performed to establish the validity evidence for measuring strength of motivation for medical school. Internal structure and relations to other variables were used as…

  14. Development and Validity Testing of Belief Measurement Model in Buddhism for Junior High School Students at Chiang Rai Buddhist Scripture School: An Application for Multitrait-Multimethod Analysis

    Science.gov (United States)

    Chaidi, Thirachai; Damrongpanich, Sunthorapot

    2016-01-01

    The purposes of this study were to develop a model to measure the belief in Buddhism of junior high school students at Chiang Rai Buddhist Scripture School, and to determine construct validity of the model for measuring the belief in Buddhism by using Multitrait-Multimethod analysis. The samples were 590 junior high school students at Buddhist…

  15. How Much Does Education Matter and Why? The Effects of Education on Socio-economic Outcomes among School-leavers in the Netherlands

    NARCIS (Netherlands)

    Velden, Rolf K.W. van der; Wolbers, Maarten H.J.

    2007-01-01

    This article explores the total (measured and unmeasured) impact of education on some of the main socio-economic outcomes (that is, employment opportunities, job security and wages) among school-leavers who finished upper secondary or tertiary education in the Netherlands. The empirical analysis

  16. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  17. Radioactive Waste SECURITY

    International Nuclear Information System (INIS)

    Brodowski, R.; Drapalik, M.; Gepp, C.; Gufler, K.; Sholly, S.

    2010-01-01

    The purpose of this work is to investigate the safety requirements for a radioactive waste repository, the fundamental problems involved and the legislative rules and arrangements for doing so. As the title already makes clear, the focus of this work is on aspects that can be assigned to the security sector - ie the security against the influence of third parties - and are to be distinguished from safety measures for the improvement of the technical safety aspects. In this context, mention is made of events such as human intrusion into guarded facilities, whereas e.g. a geological analysis on seismic safety is not discussed. For a variety of reasons, the consideration of security nuclear waste repositories in public discussions is increasingly taking a back seat, as ia. Terrorist threats can be considered as negligible risk or well calculable. Depending on the type of storage, different security aspects still have to be considered. (roessner)

  18. Connectedness among Taiwanese Middle School Students: A Validation Study of the Hemingway Measure of Adolescent Connectedness.

    Science.gov (United States)

    Karcher, Michael J.; Lee, Yun

    2002-01-01

    Examines the psychometric properties of the Hemingway Measure of Adolescent Connectedness among 320 Taiwanese junior high school students. Finds that connectedness measure subscales and composite scales demonstrated acceptable reliability and concurrent validity. Also finds, among other things, that girls report more connectedness to school than…

  19. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  20. School Violence: The Role of Parental and Community Involvement

    Science.gov (United States)

    Lesneskie, Eric; Block, Steven

    2017-01-01

    This study utilizes the School Survey on Crime and Safety to identify variables that predict lower levels of violence from four domains: school security, school climate, parental involvement, and community involvement. Negative binomial regression was performed and the findings indicate that statistically significant results come from all four…

  1. Knowledge, attitudes, and first-aid measures about epilepsy among primary school teachers in northern Iran.

    Science.gov (United States)

    Kolahi, A-A; Ghorbanpur-Valukolaei, M; Abbasi-Kangevari, M; Farsar, A-R

    2018-07-01

    To assess knowledge, attitudes, and first-aid measures about epilepsy among primary school teachers. This cross-sectional study was conducted with participation of 342 primary school teachers during September 2016 to January 2017 in cities of Babol and Qaem-Shahr in Mazandaran Province in northern Iran. Primary schools were selected using simple random sampling. Data were collected through interviews using a structured questionnaire. The knowledge section included general knowledge, causes, symptoms, seizure triggers, first-aid measures, and recommended treatments. The Likert scale was used for the attitudes section. Answers about first-aid measures were categorized as helpful or harmful. The level of total knowledge score of 25 (7.7%) teachers was very high, 140 (43.3%) high, 141 (43.8%) moderate, and 17 (5.2%) low. The mean score about general knowledge was as follows: 6.1 (1.9), range = 0-9; causes 6.3 (1.9), range = 0-10; symptoms of seizures 8.5 (2.5), range = 0-12; and first-aid measures 6.8 (2.0), range = 0-11. Some 83% knew not taking anticonvulsants regularly could trigger seizures, and all teachers said a person with epilepsy should go see a physician. Attitudes were generally positive except for marriage and having children. The level of first-aid measures score of 8 (7.2) teachers was very high, 79 (70.5) high, 25 (22.3) low. Teachers with teaching experience at special schools took more helpful measures CONCLUSIONS: The knowledge of teachers about epilepsy was insufficient, attitudes toward people with epilepsy were generally positive, and first-aid measures at the last witnessed seizure were fairly helpful. Having teaching experience in special schools had a positive influence over knowledge and taking appropriate first-aid measure at time of the last witnessed seizure. © 2018 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. Implementation of computer security at nuclear facilities in Germany

    Energy Technology Data Exchange (ETDEWEB)

    Lochthofen, Andre; Sommer, Dagmar [Gesellschaft fuer Anlagen- und Reaktorsicherheit mbH (GRS), Koeln (Germany)

    2013-07-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  3. Implementation of computer security at nuclear facilities in Germany

    International Nuclear Information System (INIS)

    Lochthofen, Andre; Sommer, Dagmar

    2013-01-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  4. No nuclear safety without security

    International Nuclear Information System (INIS)

    Anon.

    2016-01-01

    ead of Health and Safety - Nuclear Safety and Corporate Security at ENGIE Benelux, Pierre Doumont has the delicate job of defining and implementing measures, including cybersecurity, to prevent the risk of malevolent acts against tangible and intangible assets. He gives some hints on the contribution of nuclear security to safety.

  5. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  6. On the Validity of Working Memory Measures for Elementary School Children.

    Science.gov (United States)

    Morra, Sergio; Scopesi, Alda

    The literature on the measurement of working memory is discussed, with emphasis on the validity of such measurement with elementary school students. Approaches by J. Pascual-Leone, R. Case, A. D. Baddeley, and C. Hulme are considered. An experimental study is presented, in which 100 boys and 91 girls (aged from 6 years to 10 years 11 months) were…

  7. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  8. The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions

    Science.gov (United States)

    2013-12-10

    should bind PSCs actions.21 This document laid out guiding principles and best practices but fell...use the terms in this 28Stanley, 168. 29Major Kevin Clarke, “ Microeconomics , Private Security and the Significance to Operational Planning...Clarke, Kevin. “ Microeconomics , Private Security and the Significance to Operational Planning.” Master’s thesis, School of Advanced Military Studies

  9. [Violence prevention in secondary schools: the Faustlos-curriculum for middle school].

    Science.gov (United States)

    Schick, Andreas; Cierpka, Manfred

    2009-01-01

    Schools and kindergartens are particularly suitable for the implementation of violence prevention programs. Many German schools and kindergartens have securely established the violence prevention curriculum Faustlos. The Faustlos programs for kindergartens and elementary schools are now complemented with the version for middle schools. As the kindergarten- and elementary school versions the middle school program too focuses on the theoretically profound, age group-tailored promotion of empathy, impulse control and anger management. These dimensions are subdivided into the five themes "understanding the problem" "training for empathy"; "anger management", "problem solving" and "applying skills" and taught stepwise, highly structured and based on several video sequences in 31 lessons. US-American evaluation studies proof the effectiveness and the violence prevention potential of the program. With the curriculum for middle schools a comprehensive Faustlos program package is now made available to sustainably promote core violence prevention competences of children and adolescents on a developmentally appropriate level and with a consistent didactic approach.

  10. Juggling Act: Balancing Safety, Security, and Yield in School Investments.

    Science.gov (United States)

    Sallack, David J.

    2001-01-01

    Although state laws governing school district investing are quite conservative, there have been some notable investment failures leading to the loss of public funds. School districts must beware three kinds of investment risks involving credit, market, and interest rates and consider safety, legality, liquidity, and cash-flow requirements. (MLH)

  11. A Measure for Pupils' Inconsistency of Response to a Self-Report Instrument of Attitudes toward School.

    Science.gov (United States)

    Darom, Efraim; Rich, Yisrael

    1983-01-01

    To measure pupils' inconsistency in replying to a self-report questionnaire regarding attitudes toward school, 6,000 elementary and secondary school students participated in a nation-wide project to construct and validate the Israeli Quality of School Life Questionnaire (IQSL). (PN)

  12. Assessing the internal validity of a household survey-based food security measure adapted for use in Iran

    Directory of Open Access Journals (Sweden)

    Sadeghizadeh Atefeh

    2009-06-01

    Full Text Available Abstract Background The prevalence of food insecurity is an indicator of material well-being in an area of basic need. The U.S. Food Security Module has been adapted for use in a wide variety of cultural and linguistic settings around the world. We assessed the internal validity of the adapted U.S. Household Food Security Survey Module to measure adult and child food insecurity in Isfahan, Iran, using statistical methods based on the Rasch measurement model. Methods The U.S. Household Food Security Survey Module was translated into Farsi and after adaptation, administered to a representative sample. Data were provided by 2,004 randomly selected households from all sectors of the population of Isfahan, Iran, during 2005. Results 53.1 percent reported that their food had run out at some time during the previous 12 months and they did not have money to buy more, while 26.7 percent reported that an adult had cut the size of a meal or skipped a meal because there was not enough money for food, and 7.2 percent reported that an adult did not eat for a whole day because there was not enough money for food. The severity of the items in the adult scale, estimated under Rasch-model assumptions, covered a range of 6.65 logistic units, and those in the child scale 11.68 logistic units. Most Item-infit statistics were near unity, and none exceeded 1.20. Conclusion The range of severity of items provides measurement coverage across a wide range of severity of food insecurity for both adults and children. Both scales demonstrated acceptable levels of internal validity, although several items should be improved. The similarity of the response patterns in the Isfahan and the U.S. suggests that food insecurity is experienced, managed, and described similarly in the two countries.

  13. From Parent-Child Mutuality to Security to Socialization Outcomes: Developmental Cascade toward Positive Adaptation in Preadolescence

    Science.gov (United States)

    Kim, Sanghag; Boldt, Lea J.; Kochanska, Grazyna

    2016-01-01

    A developmental cascade from positive early parent-child relationship to child security with the parent to adaptive socialization outcomes, proposed in attachment theory and often implicitly accepted but rarely formally tested, was examined in 100 mothers, fathers, and children followed from toddler age to preadolescence. Parent-child Mutually Responsive Orientation (MRO) was observed in lengthy interactions at 38, 52, 67, and 80 months; children reported their security with parents at age 8. Socialization outcomes (parent- and child-reported cooperation with parental monitoring and teacher-reported school competence) were assessed at age 10. Mediation was tested with PROCESS (Hayes, 2013). The parent-child history of MRO significantly predicted both mother-child and father-child security. For mother-child dyads, security mediated links between history of MRO and cooperation with maternal monitoring and school competence, controlling for developmental continuity of the studied constructs. For father-child dyads, the mediation effect was not evident. PMID:26258443

  14. Security of radioactive sources in industrial radiography

    International Nuclear Information System (INIS)

    Popp, Andrew; Murray, Allan

    2010-01-01

    This paper describes the need and new requirements to ensure the security of radioactive sources used in the practice of industrial radiography. We describe the discussions and issues arising during the september 2010 regional workshop held in Sydney on the application of security measures to industrial radiography practices. The workshop provided the perspectives of both radiation regulators and industry practitioners, including those from the Philippines. We describe the outputs of the workshop, and how they were developed, and make suggestions for further consideration and applications of security measures in the practice of industrial radiography. (author)

  15. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  16. Security in the nuclear medicine department

    International Nuclear Information System (INIS)

    Bassingham, S.; Gane, J.; Chan, P.S.; Heenan, S.; Gulliver, N.; McVey, J.

    2005-01-01

    The current threat from terrorism highlights the need for awareness of adequate security of radioactive sources by health bodies to prevent the opportunistic access to, theft of. or accidental loss of sources, together with stringent security measures in place to prevent the international misuse of radioactive sources as a weapon by unauthorised access. This presentation discusses the processes undertaken to ensure the safety and security of radioactive materials within the nuclear medicine department in line with current regulations and guidelines. These include risk assessments, security systems, audit trails, restricted access and personnel background checks

  17. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  18. Empirical Analysis of Using Erasure Coding in Outsourcing Data Storage With Provable Security

    Science.gov (United States)

    2016-06-01

    computing and communication technologies become powerful and advanced , people are exchanging a huge amount of data, and they are de- manding more storage...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS EMPIRICAL ANALYSIS OF USING ERASURE CODING IN OUTSOURCING DATA STORAGEWITH PROVABLE SECURITY by...2015 to 06-17-2016 4. TITLE AND SUBTITLE EMPIRICAL ANALYSIS OF USING ERASURE CODING IN OUTSOURCING DATA STORAGE WITH PROVABLE SECURITY 5. FUNDING

  19. Flexicurity as a measuring leakage protection of workers: between "social pollution" and "total security".

    Directory of Open Access Journals (Sweden)

    Calogero Massimo Cammalleri

    2012-01-01

    Full Text Available Was not the labour problem the same everywhere? The paper at­tempts to answer this question by proposing a re-interpretation of flexicurity through the comparison with the economic concepts of externalities and distortion of competition. After a methodological and epistemological premise, based on a multidisciplinary literature, the paper - crit­ically addresses the origins of flexicurity and argues that it lacks an archetypical definition, especially in the formulation of the EU Commission. Hence, the paper considers flexicurity as any balance between flexibility and security and, therefore, pro­poses ordering any set of contracts, providing the same balance and with the same regulatory framework, in “communities”. It is assumed, therefore, that communities can differ either in terms of a “protective” trade­-off, where the differential is not a surrogate measure of security, or in terms of an economic trade-off, where it is met by the provision of social insurance or security. One of these sets is called community 0 and it corresponds to undeclared work, not only illegal, but also completely devoid of security and fully flexible. After identifying from ILO, EU and constitutional sources the foundation of the “incompressibility” of rights which guarantee decent work, the paper likens decent work to a public good of general interest, in the same way as laws generally recognize the natural environment. On the basis of this comparative axiom, the paper proposes considering the dispersion of security produced by undeclared work as “un-decent” work and, therefore, as a form of “pollution”. The paper proposes, conversely, to define as a “total secure” environment one where there is no loss of se­curity and, therefore, a non-polluted environment. Because an environment can be little or very polluted, the paper proposes considering as social pollution any form, even legal, of security leakage - such as that induced by the

  20. Measuring the security of external energy supply in the European Union

    Energy Technology Data Exchange (ETDEWEB)

    Le Coq, Chloe [SITE, Stockholm School of Economics, P.O. Box 6501, Stockholm 11383 (Sweden); Paltseva, Elena [Department of Economics, Copenhagen University, Oester Farimagsgade 5, Building 26, 1353 Copenhagen (Denmark)

    2009-11-15

    The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political risks of the supplying country, risk associated with energy transit, and the economic impact of a supply disruption. We construct separate indexes for three primary energy types, oil, gas and coal, and demonstrate that Member States' levels of supply risk exposure differ across energies. Most other studies of this kind provide aggregate indexes combining different types of energy. Our results suggest that an aggregate approach could be misleading, at least for discussions of the short-term response to risks. We discuss the implications of our findings for the common energy policy. (author)

  1. Measuring the security of external energy supply in the European Union

    International Nuclear Information System (INIS)

    Le Coq, Chloe; Paltseva, Elena

    2009-01-01

    The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political risks of the supplying country, risk associated with energy transit, and the economic impact of a supply disruption. We construct separate indexes for three primary energy types, oil, gas and coal, and demonstrate that Member States' levels of supply risk exposure differ across energies. Most other studies of this kind provide aggregate indexes combining different types of energy. Our results suggest that an aggregate approach could be misleading, at least for discussions of the short-term response to risks. We discuss the implications of our findings for the common energy policy. (author)

  2. Security of radioactive sources. Interim guidance for comment

    International Nuclear Information System (INIS)

    2003-06-01

    In previous IAEA publications, there have been only rather general security requirements for non-nuclear radioactive material. These requirements were primarily directed to such issues as unintentional exposure to radiation, negligence and inadvertent loss. However, it is clear that more guidance is needed to not only try and prevent further events involving orphan sources, but also to prevent the deliberate attempt to acquire radioactive sources for malevolent purposes. Member States have requested guidance on the type and nature of security measures that might be put in place and on the methodology to be used in choosing such measures. These requests were also endorsed in the findings of the international conference on 'Security of Radioactive Sources' held in March 2003. Practical advice on assessing and implementing security measures complements the general commitments in the proposed Revised Code of Conduct on Safety and Security of radioactive Sources. A Safety Guide entitled 'Safety and Security of Radiation Sources' that, amongst other things, discusses these issues is being drafted. However, it is recognized that guidance material is required before this document will be finalized in order to allow Member States opportunity to put in place appropriate actions and planning to address current issues. Hence the purpose of the current document is to provide advice on security approaches and to allow comment on detailed recommendations for levels of security on radioactive sources that may be incorporated within the Safety Guide. This report is primarily addressed to Regulatory Authorities but it is also intended to provide guidance to manufacturers, suppliers and users of sources. Its objective is to assist Member States in deciding which security measures are needed to ensure consistency with the International Basic Safety Standards and the Revised Code of Conduct for the Safety and Security of Radioactive Sources. It is recognized that there must be a

  3. Culturing Security System of Chemical Laboratory in Indonesia

    Directory of Open Access Journals (Sweden)

    Eka Dian Pusfitasari

    2017-04-01

    Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.

  4. Relationships among Student, Staff, and Administrative Measures of School Climate and Student Health and Academic Outcomes

    Science.gov (United States)

    Gase, Lauren N.; Gomez, Louis M.; Kuo, Tony; Glenn, Beth A.; Inkelas, Moira; Ponce, Ninez A.

    2017-01-01

    Background: School climate is an integral part of a comprehensive approach to improving the well-being of students; however, little is known about the relationships between its different domains and measures. We examined the relationships between student, staff, and administrative measures of school climate to understand the extent to which they…

  5. Risk assessment techniques for civil aviation security

    Energy Technology Data Exchange (ETDEWEB)

    Tamasi, Galileo, E-mail: g.tamasi@enac.rupa.i [Ente Nazionale per l' Aviazione Civile-Direzione Progetti, Studi e Ricerche, Via di Villa Ricotti, 42, 00161 Roma (Italy); Demichela, Micaela, E-mail: micaela.demichela@polito.i [SAfeR-Centro Studi su Sicurezza, Affidabilita e Rischi, Dipartimento di Scienza dei Materiali e Ingegneria Chimica, Politecnico di Torino, Corso Duca degli Abruzzi, 24, 10129 Torino (Italy)

    2011-08-15

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  6. Risk assessment techniques for civil aviation security

    International Nuclear Information System (INIS)

    Tamasi, Galileo; Demichela, Micaela

    2011-01-01

    Following the 9/11 terrorists attacks in New York a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimization of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyze the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness.

  7. Three Perspectives on DSEEP and Security : Training Goals, Use Cases and the Selection of Security Measures

    NARCIS (Netherlands)

    Möller, B.; Croom-Johnson, S.; Huiskamp, W.

    2013-01-01

    As joint, combined and Civil-Military exercises are becoming increasingly common, the need for security in collective mission simulation is growing. SISO has developed the Distributed Simulation Engineering and Execution Process (DSEEP) standard that provides a recommended process for development,

  8. Airline Security and a Strategy for Change

    National Research Council Canada - National Science Library

    Welch, Timothy J

    2006-01-01

    .... Obligated to secure the Homeland the United States Government scrambled to develop measures that would uphold societal values while providing an in-depth defense capable of ensuring a more secure society...

  9. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  10. TREsPASS Book 2: Summer School

    NARCIS (Netherlands)

    Hall, Peter; Coles-Kemp, Lizzie

    2016-01-01

    The talks presented in this book were delivered as part of a summer school held at Royal Holloway University of London between the 20th and the 23rd of June 2016. The focus of the summer school was social aspects of cyber security risk and was an engagement and dissemination activity for the EU FP7

  11. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  12. Cyber Security in Digital I and C Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William [Doosan HF Controls, Texas (United States)

    2011-08-15

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described.

  13. Cyber Security in Digital I and C Implementation

    International Nuclear Information System (INIS)

    Chow, Ivan; Hsu, Allen; Kim, Jong Min; Luo, William

    2011-01-01

    During the Nuclear Regulatory Commission (NRC) audit process of Doosan HF Control HFC-6000 safety system 2009, cyber security assessment was a major audit process. The result of the assessment was favorably satisfied. As preventing digital I and C systems from being hijacked by malicious software a major goal for the NRC, audit process of actual digital I and C implementations such as the HFC-6000 safety system which provides already strong cyber security measures is mutually beneficial to both the NRC and the vendor: NRC can enhance their set of cyber security assessments and vendors such as Doosan HFC can also augment their cyber security measures. The NRC Safety Evaluation Report (SER) for the HFC-6000 system was released in April 2011 qualifying the system to be used as safety systems in US nuclear power plants. This paper provides the summary of the cyber security assessment of the complete software life cycle of HFC-6000 Safety System. Lessons learned in each life cycle phase are provided. In addition, alternate measures or recommendations for enhancing the cyber security in each life cycle phase are also described

  14. The International Legal Framework for Nuclear Security

    International Nuclear Information System (INIS)

    2011-01-01

    The term 'nuclear security' is generally accepted to mean 'the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities.' While the ultimate responsibility for nuclear security within a State rests entirely with that State, the need for regional and international cooperation has become increasingly evident with the growing recognition that the ability to prevent, detect and respond to the threats to nuclear security within one State is affected by the adequacy and effectiveness of nuclear security measures taken by other States, particularly when nuclear material is transported across national frontiers. Since the early 1970s, the IAEA has been called upon to play an ever increasing role in assisting States, upon request, to strengthen their national legal infrastructures and physical protection systems, as well as to facilitate regional and international efforts to enhance nuclear security, including measures to protect against nuclear terrorism. This publication brings together the legally binding primary international instruments and the internationally accepted non-binding instruments that constitute the international legal framework for nuclear security. It does not discuss the safety and safeguards related instruments, which also form a part of the broader legal framework for nuclear security. By setting out the legislative bases for the mandate of the IAEA in the area of nuclear security, it is hoped that this publication will increase awareness of the IAEA's role in facilitating national, regional and international efforts to enhance nuclear security , including measures to protect against nuclear terrorism. It is also intended to serve as a guide in carrying out the IAEA's nuclear security mandate and functions assigned to it under these instruments, including in the elaboration of nuclear security

  15. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  16. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  17. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  18. A short overview of measures for securing water resources for irrigated crop production

    DEFF Research Database (Denmark)

    Jensen, Christian Richardt; Ørum, Jens Erik; Pedersen, Søren Marcus

    2014-01-01

    Agriculture is the main user of limited fresh water resources in the world. Optimisation of agricultural water resources and their use can be obtained by both agronomical and political incentives. Important options are: reduction of the loss of irrigation water in conveyance before it reaches...... of the 'virtual water' principles so that water-rich regions secure food supply to dry regions; reduction in waste of food, feed and biofuel from post-harvest to the end consumer; changing of food composition to less water-consuming products; regulating amount of irrigation water by rationing, subsidies or water...... pricing to support water-saving measures such as use of drip, irrigation scheduling and DI. The potential for water saving for different measures is discussed and estimated. Reduction in waste of food and loss of irrigation water from conveyance source to farm both has a great potential for water saving...

  19. Social Security and Part-Time Employment.

    Science.gov (United States)

    Euzeby, Alain

    1988-01-01

    Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)

  20. Nutritional, Economic, and Environmental Costs of Milk Waste in a Classroom School Breakfast Program.

    Science.gov (United States)

    Blondin, Stacy A; Cash, Sean B; Goldberg, Jeanne P; Griffin, Timothy S; Economos, Christina D

    2017-04-01

    To measure fluid milk waste in a US School Breakfast in the Classroom Program and estimate its nutritional, economic, and environmental effects. Fluid milk waste was directly measured on 60 elementary school classroom days in a medium-sized, urban district. The US Department of Agriculture nutrition database, district cost data, and carbon dioxide equivalent (CO 2 e) emissions and water footprint estimates for fluid milk were used to calculate the associated nutritional, economic, and environmental costs. Of the total milk offered to School Breakfast Program participants, 45% was wasted. A considerably smaller portion of served milk was wasted (26%). The amount of milk wasted translated into 27% of vitamin D and 41% of calcium required of School Breakfast Program meals. The economic and environmental costs amounted to an estimated $274 782 (16% of the district's total annual School Breakfast Program food expenditures), 644 893 kilograms of CO 2 e, and 192 260 155 liters of water over the school year in the district. These substantial effects of milk waste undermine the School Breakfast Program's capacity to ensure short- and long-term food security and federal food waste reduction targets. Interventions that reduce waste are urgently needed.

  1. Conceptual foundation for measures of physical function and behavioral health function for Social Security work disability evaluation.

    Science.gov (United States)

    Marfeo, Elizabeth E; Haley, Stephen M; Jette, Alan M; Eisen, Susan V; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Brandt, Diane E; Rasch, Elizabeth K

    2013-09-01

    Physical and mental impairments represent the 2 largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person's underlying capabilities as well as activity demands relevant to the context of work. The objective of this article is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, 2 content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability and Health as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies 5 major domains: (1) behavior control, (2) basic interactions, (3) temperament and personality, (4) adaptability, and (5) workplace behaviors. The content model describing physical functioning includes 3 domains: (1) changing and maintaining body position, (2) whole-body mobility, and (3) carrying, moving, and handling objects. These content models informed subsequent measurement properties including item development and measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  2. Measuring Parenting Practices among Parents of Elementary School-Age Youth

    Science.gov (United States)

    Randolph, Karen A.; Radey, Melissa

    2011-01-01

    Objectives: The objective of this study is to establish the factor structure of the Alabama Parenting Questionnaire (APQ), an instrument designed to measure parenting practices among parents of elementary school children. Methods: Exploratory (EFA) and confirmatory factor analytic (CFA) procedures are used to validate the APQ with 790 parents of…

  3. Breach Risk Magnitude: A Quantitative Measure of Database Security.

    Science.gov (United States)

    Yasnoff, William A

    2016-01-01

    A quantitative methodology is described that provides objective evaluation of the potential for health record system breaches. It assumes that breach risk increases with the number of potential records that could be exposed, while it decreases when more authentication steps are required for access. The breach risk magnitude (BRM) is the maximum value for any system user of the common logarithm of the number of accessible database records divided by the number of authentication steps needed to achieve such access. For a one million record relational database, the BRM varies from 5.52 to 6 depending on authentication protocols. For an alternative data architecture designed specifically to increase security by separately storing and encrypting each patient record, the BRM ranges from 1.3 to 2.6. While the BRM only provides a limited quantitative assessment of breach risk, it may be useful to objectively evaluate the security implications of alternative database organization approaches.

  4. Risk Assessment Generated by Usage of ICT and Information Security Measures

    Directory of Open Access Journals (Sweden)

    Ilie TAMAS

    2006-01-01

    Full Text Available Information societies involve the usage of information technology and communications (ITC on a large scale. The dependence on ITC is an unquestionable problem in the present, because we assist to a generality of computers usage in all economic and social life activities. That is why organization information systems became accessible at the global level and there are permanently open for a quick exchange of information between different categories of users located by different geographical nods. The ITC usage involves the existing of some risks that should be known, evaluation and based on these, we must have information systems security measure. We consider that the risk is an indicator very important that must be permanently assess in the usage process of the information system based on ITC. Risk management suppose a permanently evaluation of these problems and also restrain by some practical actions who goes to the decrease of its effects. From the expose point of view, in this paper work it is presented the results of research based on specialty literature and current cases from practical activities, regarding the risks of ITC usage and their diminishing measure. There are distinguished the main factors (threat, vulnerability and impact who affect the information risk and on the other way, diminishing measure of the action to these factors for optimum working of an economic and social organism who use ITC. We consider that through proposed measures we assume safety in design process, implement and usage of the informational systems based on ITC.

  5. Objectively Measured School Day Physical Activity Among Elementary Students in the United States and Finland.

    Science.gov (United States)

    Yli-Piipari, Sami; Kulmala, Janne Santeri; Jaakkola, Timo; Hakonen, Harto; Fish, Joseph Cole; Tammelin, Tuija

    2016-04-01

    Schools are in a unique position to ensure that all students meet the current physical activity (PA) recommendations. This study aimed to examine 1st to 3rd grade elementary students' accelerometer measured school day PA in the United States (U.S.) and Finland. The sample consisted of 200 students (107 girls, 93 boys; ages 6 to 8) and their school day PA was monitored with hip-worn ActiGraph GT3X+ accelerometers across a 5-day school week and the thresholds 100 and 2296 count per minute were used to separate sedentary time, light PA, and moderate-to-vigorous PA (MVPA). On an average school day, students were engaged in MVPA for 20.0 min in the U.S. and 24.1 min in Finland. Students' school-day MVPA was 9 to 16 minutes higher during physical education (PE) days compared with non-PE days (U.S: 25.8 vs. 16.6 min/day; Finland: 36.3 vs. 20.1 min/day). Girls had less MVPA and more sedentary time compared with boys in both samples. This study highlights both the role of PE and other school day physical activities in meeting PA guidelines. Policy measures are needed to change the structure of the school day and enhance PA to ensure that students meet the PA recommendations.

  6. A scoping review of traditional food security in Alaska.

    Science.gov (United States)

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  7. Performing privacy in schools

    DEFF Research Database (Denmark)

    Lauritsen, Peter; Bøge, Ask Risom; Andersen, Lars Bo

    with technologies is carried out as well as observation is conducted. We obtain and present new knowledge about how surveillance is practiced in the interpersonal relations of students and teachers. References: Monahan, T., & Torres, R. D. (2009). Schools Under Surveillance: Cultures of Control in Public Education....... Rutgers University Press. Selwyn, N. (2010). Schools and Schooling in the Digital Age: A Critical Analysis. Routledge. Taylor, E. (2013). Surveillance Schools: Security, Discipline and Control in Contemporary Education. Palgrave Macmillan UK. Taylor, E., & Rooney, T. (2016). Surveillance Futures: Social......In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students...

  8. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  9. Nuclear Arms and National Security. 1983 National Issues Forum.

    Science.gov (United States)

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  10. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  11. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  12. A Practice of Secure Development and Operational Environment Plan

    International Nuclear Information System (INIS)

    Park, Jaekwan; Seo, Sangmun; Suh, Yongsukl; Park, Cheol

    2017-01-01

    This paper suggests a practice of plan for SDOE establishment in a nuclear I and C. First, it is necessary to perform a requirements analysis to define key regulatory issues and determine the target systems. The analysis includes a survey to find out the applicable measures credited internationally. Based on the analysis results, this paper proposes an implementation plan including a process harmonizing security activities with legacy software activities and applicable technical, operational, and management measures for target systems. Recently, nuclear I and C has been faced with two security issues, cyber security (CS) and secure development and operational environment (SDOE). Unlike cyber security, few studies on planning SDOE have been presented. This paper suggests a plan for establishing an SDOE in a nuclear I and C. This paper defines three key considerations to comply with the regulatory position of RG. 1.152(R3) and proposes a process harmonizing the security activities with legacy software activities. In addition, this paper proposes technical, operational, and management measures applicable for SDOE.

  13. Measurements of the solar UVR protection provided by shade structures in New Zealand primary schools.

    Science.gov (United States)

    Gies, Peter; Mackay, Christina

    2004-01-01

    To reduce ultraviolet radiation (UVR) exposure during childhood, shade structures are being erected in primary schools to provide areas where children can more safely undertake outdoor activities. This study to evaluate the effectiveness of existing and purpose built shade structures in providing solar UVR protection was carried out on 29 such structures in 10 schools in New Zealand. Measurements of the direct and scattered solar UVR doses within the central region of the shade structures were made during the school lunch break period using UVR-sensitive polysulfone film badges. These measurements indicate that many of the structures had UVR protection factors (PF) of 4-8, which was sufficient to provide protection during the school lunch hour. However, of the 29 structures examined, only six would meet the suggested requirements of UVR PF greater than 15 required to provide all-day protection.

  14. Food security assessment in the coastal area of Demak Regency

    Science.gov (United States)

    Harini, R.; Handayani, H. N.; Ramdani, F. R.

    2018-04-01

    Food security is an issue of national and global level. Food is a basic human need to live. Without food will threaten human life. This research was conducted in coastal area of Demak Regency. This research is to understand the potential of human resources, natural resources and assess the level of food security of coastal communities. The data used are primary data through interviews with the local community. Also used Secondary data from government agencies. Data analysis used qualitative and quantitative descriptive methods through graphs, tables and maps. The results showed that potential of human resources in Demak coastal area (Wedung, Purworejo, and Sidogemah villages) is low. It can be indicated from education level of respondents in Demak are elementary school and junior high school. Beside, total households income are about 2-4 million. This study found that the households sampled are 90% is food insecured households. The most of households in Demak coastal area are about 90% households include on insecurity food category.

  15. Student Drug Testing and the Surveillance School Economy: An Analysis of Media Representation and Policy Transfer in Australian Schools

    Science.gov (United States)

    Taylor, Emmeline

    2018-01-01

    Anxieties relating to the health, safety and security of schoolchildren have been met with a variety of surveillance apparatus in schools internationally. Drawing on findings from a content analysis of newspaper reports relating to drug testing in Australian schools, this article seeks to excavate the ways in which the media shapes, informs,…

  16. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  17. The security aspect

    International Nuclear Information System (INIS)

    Clutterbuck, R.

    1984-01-01

    The question of the risks of deliberate criminal or politically motivated attack, theft or hijacking of irradiated fuel in transit is discussed. Headings; possible forms of interference; security measures; attractions and limitations as a target. (U.K.)

  18. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  19. Breakfast-Skipping and Selecting Low-Nutritional-Quality Foods for Breakfast Are Common among Low-Income Urban Children, Regardless of Food Security Status.

    Science.gov (United States)

    Dykstra, Holly; Davey, Adam; Fisher, Jennifer O; Polonsky, Heather; Sherman, Sandra; Abel, Michelle L; Dale, Lauren C; Foster, Gary D; Bauer, Katherine W

    2016-03-01

    Universal access to the School Breakfast Program (SBP) is intended to help low-income and food-insecure students overcome barriers to eating breakfast. However, SBP participation is often still low despite universal access. Further information is needed with regard to these children's breakfast behaviors, and in particular breakfast behaviors among youth from food-insecure families, to inform effective breakfast interventions. The objective of this study was to examine breakfast behaviors among a large sample of urban students with universal access to the SBP and to identify differences in breakfast behaviors among children from food-secure compared with food-insecure households. A cross-sectional study of 821 fourth- through sixth-grade students and their parents from 16 schools was conducted. Students reported the foods/drinks selected and location of obtaining food/drink on the morning of data collection, parents reported household food security status using the 6-item Food Security Survey Module, and the school district provided SBP participation data during the fall semester of 2013. Multivariable linear regression models accounting for school-level clustering were used to examine differences in breakfast behaviors across 3 levels of household food security: food secure, low food secure, and very low food secure. Students participated in the SBP 31.2% of possible days, with 13% never participating in the SBP. One-fifth (19.4%) of students purchased something from a corner store for breakfast, and 16.9% skipped breakfast. Forty-six percent of students were food insecure; few differences in breakfast behaviors were observed across levels of food security. Despite universal access to the SBP, participation in the SBP is low. Breakfast skipping and selection of foods of low nutritional quality in the morning are common, regardless of household food security status. Additional novel implementation of the SBP and addressing students' breakfast preferences may be

  20. A Conceptual Foundation for Measures of Physical Function and Behavioral Health Function for Social Security Work Disability Evaluation

    Science.gov (United States)

    Marfeo, Elizabeth E.; Haley, Stephen M.; Jette, Alan M.; Eisen, Susan V.; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M.; Chan, Leighton; Brandt, Diane E.; Rasch, Elizabeth K.

    2014-01-01

    Physical and mental impairments represent the two largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person’s underlying capabilities as well as activity demands relevant to the context of work. The objective of this paper is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, two content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability, and Health (ICF) as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies five major domains (1) Behavior Control, (2) Basic Interactions, (3) Temperament and Personality, (4) Adaptability, and (5) Workplace Behaviors. The content model describing physical functioning includes three domains (1) Changing and Maintaining Body Position, (2) Whole Body Mobility, and (3) Carrying, Moving and Handling Objects. These content models informed subsequent measurement properties including item development, measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work. PMID:23548543

  1. Measurements of the UVR protection provided by hats used at school.

    Science.gov (United States)

    Gies, Peter; Javorniczky, John; Roy, Colin; Henderson, Stuart

    2006-01-01

    The importance of protection against solar ultraviolet radiation (UVR) in childhood has lead to SunSmart policies at Australian schools, in particular primary schools, where children are encouraged and in many cases required to wear hats at school. Hat styles change regularly and the UVR protection provided by some of the hat types currently used and recommended for sun protection by the various Australian state cancer councils had not been previously evaluated. The UVR protection of the hats was measured using UVR sensitive polysulphone film badges attached to different facial sites on rotating headforms. The sun protection type hats included in this study were broad-brimmed hats, "bucket hats" and legionnaires hats. Baseball caps, which are very popular, were also included. The broad-brimmed hats and bucket hats provided the most UVR protection for the six different sites about the face and head. Legionnaires hats also provided satisfactory UVR protection, but the caps did not provide UVR protection to many of the facial sites. The highest measured UVR protection factors for facial sites other than the forehead were 8 to 10, indicating that, while some hats can be effective, they need to be used in combination with other forms of UVR protection.

  2. Security issues in a parking facility.

    Science.gov (United States)

    Gutman, Abraham; Lew, I Paul

    2009-01-01

    Active security supported by passive security measures which are part of the physical design of a parking facility are essential to preventing crimes from happening wherever and whenever possible, the authors maintain. In the article, they focus on design elements which can be most effective in discouraging potential perpetrators.

  3. The Muslim Problematic: Muslims, State Schools and Security

    Science.gov (United States)

    Miah, Shamim

    2016-01-01

    Muslims are folk-devils that mark the ubiquitous moral panic. For some, the idea of the "Muslim problematic" signifies a long and worrying trend of creeping "Islamification" of state schools. For others, the discourse of the "Muslim problematic" reflects the ongoing racial patholigisation of Britain's minoritised…

  4. Security-by-design approach of the KALIMER 600 SFR plant

    International Nuclear Information System (INIS)

    So, Dong Sup; Lee, Yong Bum

    2012-01-01

    Security measures as well as safety and safeguards measures should be incorporated and addressed early in the design process to enhance the cost effectiveness of a PPS (Physical Protection System). Safety, security, operations, and safeguards design teams and regulators need to be flexible and perform 'trade studies' on the available options. In this paper, SBD (Security by Design) measures in the design phase of the KALIMER 600 SFR (Sodium Cooled Reactor) plant are identified and discussed qualitatively

  5. Purchasing. School Business Management Handbook Number 5.

    Science.gov (United States)

    New York State Education Dept., Albany.

    Purchasing, one of the most highly specialized activities in school administration, involves securing material or service in the right quantity and quality, at the right time, and for the right price. This handbook, intended as a guide for purchasing agents, details principles essential for operating a school purchasing office in New York State.…

  6. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  7. Perceptions of randomized security schedules.

    Science.gov (United States)

    Scurich, Nicholas; John, Richard S

    2014-04-01

    Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed. © 2013 Society for Risk Analysis.

  8. Security measures effect over performance in service provider network

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Abstract—network security is defined as a set of policies and actions taken by a ... These threats are linked with the following factors that are ... typically smaller than those in the service provider space. ... Service providers cannot manage to provide ... e the DB performance effect ... r the business needs [10].

  9. Measuring energy security: Trends in the diversification of oil and natural gas supplies

    International Nuclear Information System (INIS)

    Cohen, Gail; Joutz, Frederick; Loungani, Prakash

    2011-01-01

    We present evidence on one facet of energy security in OECD economies-the extent of diversification in sources of oil and natural gas supplies. Viewed from the perspective of the energy-importing countries as a whole, there has not been much change in diversification in oil supplies over the last decade, but diversification in sources of natural gas supplies has increased steadily. We document the considerable cross-country heterogeneity in the extent of diversification. We also show how the extent of diversification changes if account is taken of the political risk attached to suppliers; the size of the importing country; and transportation risk. - Highlights: → Global diversification is constant but large differences exist among countries. → Political risk and distance have large impacts on diversity measures. → Size has little impact on diversity measures. → France, US, and UK show low vulnerability for both fuels. → Smaller European countries show high vulnerability for both fuels.

  10. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  11. A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability

    DEFF Research Database (Denmark)

    Pieters, Wolter; van der Ven, Sanne H.G.; Probst, Christian W.

    2012-01-01

    One of the big problems of risk assessment in information security is the quantification of risk-related properties, such as vulnerability. Vulnerability expresses the likelihood that a threat agent acting against an asset will cause impact, for example, the likelihood that an attacker will be ab...... to its application to children solving math problems. It provides an innovative and sound way to quantify vulnerability in models of (information) security.......One of the big problems of risk assessment in information security is the quantification of risk-related properties, such as vulnerability. Vulnerability expresses the likelihood that a threat agent acting against an asset will cause impact, for example, the likelihood that an attacker will be able......-interprets security from the field of Item Response Theory. By observing the success of threat agents against assets, one can rate the strength of threats and controls, and predict the vulnerability of systems to particular threats. The application of Item Response Theory to the field of risk is new, but analogous...

  12. Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis

    Science.gov (United States)

    Mesjasz, Czeslaw

    The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.

  13. CAR SECURITY ENHANCEMENT IN PARKING AREAS

    OpenAIRE

    NANYONGA BERINDA; AYESIGA LINDSEY PATRA; BYEKWASO FAISAL; NATULINDA LADAN

    2017-01-01

    Over time, car thefts have been reported within Kampala parking areas. This has been majorly due to inefficient security measures of the available parking systems which focus mainly on the car and not the driver, making parking management a challenge. The focus of this survey was to explore the requirements of a new system called Car to Driver Matching Security System to enhance security of cars in Kampala, in particular, from the experience of 15 people. The data collected was then analyzed ...

  14. Analysis of High School German Textbooks through Rasch Measurement Model

    Science.gov (United States)

    Batdi, Veli; Elaldi, Senel

    2016-01-01

    The purpose of the present study is to analyze German teacher trainers' views on high school German textbooks through the Rasch measurement model. A survey research design was employed and study group consisted of a total of 21 teacher trainers, three from each region and selected randomly from provinces which are located in seven regions and…

  15. The association of household food security, household characteristics and school environment with obesity status among off-reserve First Nations and Métis children and youth in Canada: results from the 2012 Aboriginal Peoples Survey.

    Science.gov (United States)

    Bhawra, Jasmin; Cooke, Martin J; Guo, Yanling; Wilk, Piotr

    2017-03-01

    Indigenous children are twice as likely to be classified as obese and three times as likely to experience household food insecurity when compared with non- Indigenous Canadian children. The purpose of this study was to explore the relationship between food insecurity and weight status among Métis and off-reserve First Nations children and youth across Canada. We obtained data on children and youth aged 6 to 17 years (n = 6900) from the 2012 Aboriginal Peoples Survey. We tested bivariate relationships using Pearson chi-square tests and used nested binary logistic regressions to examine the food insecurity-weight status relationship, after controlling for geography, household and school characteristics and cultural factors. Approximately 22% of Métis and First Nations children and youth were overweight, and 15% were classified as obese. Over 80% of the sample was reported as food secure, 9% experienced low food security and 7% were severely food insecure. Off-reserve Indigenous children and youth from households with very low food security were at higher risk of overweight or obese status; however, this excess risk was not independent of household socioeconomic status, and was reduced by controlling for household income, adjusted for household size. Negative school environment was also a significant predictor of obesity risk, independent of demographic, household and geographic factors. Both food insecurity and obesity were prevalent among the Indigenous groups studied, and our results suggest that a large proportion of children and youth who are food insecure are also overweight or obese. This study reinforces the importance of including social determinants of health, such as income, school environment and geography, in programs or policies targeting child obesity.

  16. The elementary school teachers’ ability in the length measurement

    Science.gov (United States)

    Julie, Hongki

    2017-09-01

    The purpose of this study was to describe the elementary school teachers' mathematical ability (1) to develop students’ activities which constructed longer than, shorter than, and as long as concepts, (2) to develop students’ activities which constructed standard unit on the length measurement, and (3) to develop a problem which used by student to construct why a conversion activity on the unit of the length was useful in the daily life after they have participated in the Realistic Mathematics Education (RME) workshops. Curry and Outhread said if teachers knew more about the growth of students’ conceptual understanding of the length, they would be better able to teach that topic [4]. Therefore, in the workshop, teachers were asked to learn more on the stages of the measurement teaching and learning process and why each stage was important. This capability was described by the results of a test which was content of four problems given to teachers after they have attended the workshop. Research subjects in this study were 14 elementary school teachers at Yogyakarta. The results of the study were as follows: (1) only four of 14 teachers who had the first ability; (2) all teachers had the second ability; and (3) all the teachers did not have the third ability.

  17. Radon in schools. An elevation measurement in schools in Baden-Wuerttemberg; Radon in Schulen. Eine Erhebungsmessung in Baden-Wuerttemberg

    Energy Technology Data Exchange (ETDEWEB)

    Fesenbeck, I.; Naber, C.; Frank, G.; Wilhelm, C.; Schaller, M. [Karlsruher Institut fuer Technologie (Germany). Sicherheit und Umwelt

    2016-07-01

    With an effective dose of about 1.1 mSv per year, radon and its secondary products have the biggest share in the population's natural radiation exposure. For implementation of the new EU directive 2013/59/EURATOM dated January 17, 2014, it is now planned to adapt the limit values of the Radiation Protection Ordinance and to extend the scope of validity in the EU member states. The ''Radon at Schools'' project is to cover an area-wide survey of radon concentrations in room air of schools in Baden-Wuerttemberg. Potential hazards caused by radon-222 and secondary products of radon are to be studied. For the project, 1600 schools were selected and requested to participate by an information letter. Half of the schools is distributed over the entire area of Baden-Wuerttemberg. The other half is located in areas of increased radon potential. Radon concentration in room air is determined passively by Karlsruhe radon exposimeters. Subsequently, active radon measurements will be made at conspicuous schools and information events will be offered for municipalities, teachers, interested parents, and pupils.

  18. Measuring information security breach impact and uncertainties under various information sharing scenarios

    OpenAIRE

    Durowoju, Olatunde; Chan, Hing; Wang, Xiaojun

    2013-01-01

    This study draws on information theory and aims to provide simulated evidence using real historical and statistical data to demonstrate how various levels of integration moderate the impact and uncertainties of information security breach on supply chain performance. We find that the supply chain behaves differently under various levels of integration when a security breach occurs. The entropy analysis revealed that the wholesaler experience the most uncertainty under system failure and data ...

  19. Towards Information Security Metrics Framework for Cloud Computing

    OpenAIRE

    Muhammad Imran Tariq

    2012-01-01

    Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet.  Cost and security are influential issues to deploy cloud computing in large enterprise.  Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS) metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard...

  20. Bio-Security Measures Employed by Poultry Farmers in Enugu State ...

    African Journals Online (AJOL)

    User

    In spite of this, food security, improved livelihood and attainment of self- ..... experience in farm business management enables farmers to set realistic time and ... had no significant effect on biosecurity practices of poultry farmers is inconsistent.