WorldWideScience

Sample records for school security measures

  1. Punishment in School: The Role of School Security Measures

    Directory of Open Access Journals (Sweden)

    Thomas J Mowen

    2014-09-01

    Full Text Available Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001, perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010, and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004; Kupchik, 2010, few studies have sought to explore the impacts of these measures on suspension rates. Using data from the Educational Longitudinal Study (2002, I explore the relationship between security measures and in-school, out-of-school, and overall suspension rates. Results indicate schools with a security officer experience higher rates of in-school suspensions but have no difference in rates of out-of-school or overall suspensions compared to schools without a security officer. No other measure of security was related to higher suspension rates. As prior literature suggests, schools with greater proportions of black students experienced significantly higher rates of all suspension types. Finally, different types of parental involvement correlated with both higher and lower suspension rates.

  2. Punishment in School: The Role of School Security Measures

    Science.gov (United States)

    Mowen, Thomas J.

    2014-01-01

    Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001), perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010), and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004;…

  3. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    Science.gov (United States)

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  4. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    Science.gov (United States)

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  5. School Security Measures and Longitudinal Trends in Adolescents' Experiences of Victimization.

    Science.gov (United States)

    Fisher, Benjamin W; Mowen, Thomas J; Boman, John H

    2018-06-01

    Although school security measures have become a common fixture in public schools across the United States, research on the relationship between security and adolescent victimization is mixed, with very few studies examining trends in adolescent victimization across time. Using two waves of data from the Educational Longitudinal Study 2002 (N = 7659; 50.6% female; 56.7% White, 13.3% Black, 13.5% Hispanic, 11.3% Asian American, 5.4% other race), results from a series of multi-level models demonstrate that adolescents in schools with more security measures report higher odds of being threatened with harm, and no difference in odds of being in a physical altercation or having something stolen over time. Although prior research has established racial disparities in using school security measures, results demonstrate inconsistent patterns in the extent to which adolescents' race conditions the relationship between security and victimization. The findings are discussed in light of existing theoretical and empirical work, and implications for both research and practice are offered.

  6. Today's School Security

    Science.gov (United States)

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  7. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  8. School Security: Planning and Costs.

    Science.gov (United States)

    Hunter, Richard C.; Mazingo, Terri H.

    2003-01-01

    Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…

  9. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are cschools incorporate good security practices, which will rarely increase new building costs if included in the initial planning.

  10. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  11. Staying Secure for School Safety

    Science.gov (United States)

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  12. Security Measures in Data Mining

    OpenAIRE

    Anish Gupta; Vimal Bibhu; Rashid Hussain

    2012-01-01

    Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determin...

  13. New computer security measures

    CERN Multimedia

    IT Department

    2008-01-01

    As a part of the long-term strategy to improve computer security at CERN, and especially given the attention focused to CERN by the start-up of the LHC, two additional security measures concerning DNS and Tor will shortly be introduced. These are described in the following texts and will affect only a small number of users. "PHISHING" ATTACKS CONTINUE CERN computer users continue to be subjected to attacks by people trying to infect our machines and obtain passwords and other confidential information by social engineering trickery. Recent examples include an e-mail message sent from "La Poste" entitled "Colis Postal" on 21 August, a fake mail sent from web and mail services on 8 September, and an e-mail purporting to come from Hallmark Cards announcing the arrival of an electronic postcard. However, there are many other examples and there are reports of compromised mail accounts being used for more realistic site-specific phishing attempts. Given the increased publicity rela...

  14. Experience of executing security measures

    International Nuclear Information System (INIS)

    Nakano, Hiromasa

    1995-01-01

    Japan possesses many nuclear power stations and atomic energy research and development facilities, and obtained much experience of security measures such as the inspection by the government and IAEA, the technical development and so on in respective facilities. In this report, the activities of security measures in Japan are introduced, centering around the experience of Power Reactor and Nuclear Fuel Development Corporation. Japan ratified the nuclear nonproliferation treaty (NPT) in 1976, and concluded the agreement with IAEA in 1977. It is called security measures to technically confirm that nuclear substances are not used for nuclear weapons, and to find early and prevent the production of nuclear weapons. The security measures consist of the quantity management by the balance of nuclear substances are the inspection by the government and IAEA. The present state of security measures in centrifugal uranium enrichment plants, the fabrication factories of low enriched uranium fuel, nuclear reactors, fuel reprocessing plants, and plutonium fuel factories is reported. The amount of inspection works of the government was 1861 man-day/year in 1993. As the subjects related to security measures of hereafter, the quantity management by respective facilities, the technology of verifying the measurement by inspectors, the points of beginning and finishing security measures, the security measures of hereafter and the international cooperation are described. (K.I.)

  15. How to Establish Security Awareness in Schools

    Science.gov (United States)

    Beyer, Anja; Westendorf, Christiane

    The internet is a fast changing medium and comprises several websites fraught with risk. In this context especially young age groups are endangered. They have less experience using the media and little knowledge on existing internet risks. There are a number of initiatives, which are engaged in the topic of internet safety. They provide information about measures on how to prevent and to deal with internet risks. However it is not certain if these initiatives do reach their target group (children and adolescents). In this regard schools bear a special relevance, since they have the knowledge about didactic methods and the chance to address measures directly to children and adolescents. The authors of this paper provide an overview of current security education in German schools, problems and open questions. Finally the authors make recommendations on how to establish internet safety in schools.

  16. The "School Safety & Security Questionnaire": Middle Grades Students' Perceptions of Safety at School

    Science.gov (United States)

    Miller, Janice Williams; Nickell, Linda K.

    2008-01-01

    This study presents the development and basic psychometric characteristics of the "School Safety and Security Questionnaire" (SSSQ). This new measure was constructed to assess middle grade students' perceptions of safety and security during the school year. The content validity of the theoretically-based instrument was assessed and the measure was…

  17. The Hidden Cost of School Security

    Science.gov (United States)

    DeAngelis, Karen J.; Brent, Brian O.; Ianni, Danielle

    2011-01-01

    A spate of school shootings in the U.S. has prompted policymakers to address the public's growing perception that our schools are unsafe. As education policymakers continue to press for additional security initiatives, it is important to understand the costs borne by school systems for these programs. Thus far, the scholarly literature is silent…

  18. School Security: For Whom and with What Results?

    Science.gov (United States)

    Servoss, Timothy J.; Finn, Jeremy D.

    2014-01-01

    This study utilized school-level data from several combined national databases to address two questions regarding school security policy: (1) What are the school characteristics related to levels of security? (2) How does security relate to school suspension, dropout, and college attendance rates? Among the predictors of school security, having a…

  19. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  20. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  1. MCPS School Safety & Security at a Glance 2013-2014

    Science.gov (United States)

    Montgomery County Public Schools, 2014

    2014-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  2. MCPS School Safety & Security at a Glance 2012-2013

    Science.gov (United States)

    Montgomery County Public Schools, 2013

    2013-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  3. MCPS School Safety & Security at a Glance 2011-2012

    Science.gov (United States)

    Montgomery County Public Schools, 2012

    2012-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents. Information is presented for each Montgomery County (Maryland) public school. While much of this…

  4. Towards Comprehensive Food Security Measures: Comparing Key ...

    African Journals Online (AJOL)

    Food security is a multi-dimensional issue that has been difficult to measure comprehensively, given the one-dimensional focus of existing indicators. Three indicators dominate the food security measurement debate: Household Food Insecurity Access Scale (HFIAS), Dietary Diversity Score (DDS) and Coping Strategies ...

  5. School Security and Crisis Preparedness: Make It Your Business.

    Science.gov (United States)

    Trump, Kenneth S.

    1999-01-01

    The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…

  6. Measuring School Contexts

    Directory of Open Access Journals (Sweden)

    Chandra L. Muller PhD

    2015-11-01

    Full Text Available This article describes issues in measuring school contexts with an eye toward understanding students’ experiences and outcomes. I begin with an overview of the conceptual underpinnings related to measuring contexts, briefly describe the initiatives at the National Center for Education Statistics to measure school contexts, and identify possible gaps in those initiatives that if filled could provide valuable new data for researchers. Next, I discuss new approaches and opportunities for measurement, and special considerations related to diverse populations and youth development. I conclude with recommendations for future priorities.

  7. Measuring Information Security: Guidelines to Build Metrics

    Science.gov (United States)

    von Faber, Eberhard

    Measuring information security is a genuine interest of security managers. With metrics they can develop their security organization's visibility and standing within the enterprise or public authority as a whole. Organizations using information technology need to use security metrics. Despite the clear demands and advantages, security metrics are often poorly developed or ineffective parameters are collected and analysed. This paper describes best practices for the development of security metrics. First attention is drawn to motivation showing both requirements and benefits. The main body of this paper lists things which need to be observed (characteristic of metrics), things which can be measured (how measurements can be conducted) and steps for the development and implementation of metrics (procedures and planning). Analysis and communication is also key when using security metrics. Examples are also given in order to develop a better understanding. The author wants to resume, continue and develop the discussion about a topic which is or increasingly will be a critical factor of success for any security managers in larger organizations.

  8. INFORMATION SECURITY IN MOBILE MODULAR MEASURING SYSTEMS

    Directory of Open Access Journals (Sweden)

    A. N. Tkhishev

    2017-01-01

    Full Text Available A special aspect of aircraft test is carrying out both flight evaluation and ground operation evaluation in a structure of flying aids and special tools equipment. The specific of flight and sea tests involve metering in offshore zone, which excludes the possibility of fixed geodetically related measuring tools. In this regard, the specific role is acquired by shipbased measurement systems, in particular the mobile modular measuring systems. Information processed in the mobile modular measurement systems is a critical resource having a high level of confidentiality. When carrying out their functions, it should be implemented a proper information control of the mobile modular measurement systems to ensure their protection from the risk of data leakage, modification or loss, i.e. to ensure a certain level of information security. Due to the specific of their application it is difficult to solve the problems of information security in such complexes. The intruder model, the threat model, the security requirements generated for fixed informatization objects are not applicable to mobile systems. It was concluded that the advanced mobile modular measuring systems designed for flight experiments monitoring and control should be created due to necessary information protection measures and means. The article contains a diagram of security requirements formation, starting with the data envelopment analysis and ending with the practical implementation. The information security probabilistic model applied to mobile modular measurement systems is developed. The list of current security threats based on the environment and specific of the mobile measurement system functioning is examined. The probabilistic model of the information security evaluation is given. The problems of vulnerabilities transformation of designed information system into the security targets with the subsequent formation of the functional and trust requirements list are examined.

  9. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2007-01-01

    This report to Congress, Measuring Stability and Security in Iraq, is submitted pursuant to Section 9010 of the Department of Defense Appropriations Act 2007, Public Law 109-289 as amended by Section...

  10. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2008-01-01

    ... 1308 of Public Law 110-28 and Section 1224 of Public Law 110-181.1 The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  11. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2007-01-01

    ... 1308 of Public Law 110-28. The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  12. Portfolio analysis of layered security measures.

    Science.gov (United States)

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. © 2014 Society for Risk Analysis.

  13. Validity and reliability of food security measures.

    Science.gov (United States)

    Cafiero, Carlo; Melgar-Quiñonez, Hugo R; Ballard, Terri J; Kepple, Anne W

    2014-12-01

    This paper reviews some of the existing food security indicators, discussing the validity of the underlying concept and the expected reliability of measures under reasonably feasible conditions. The main objective of the paper is to raise awareness on existing trade-offs between different qualities of possible food security measurement tools that must be taken into account when such tools are proposed for practical application, especially for use within an international monitoring framework. The hope is to provide a timely, useful contribution to the process leading to the definition of a food security goal and the associated monitoring framework within the post-2015 Development Agenda. © 2014 New York Academy of Sciences.

  14. [The concept and measurement of food security].

    Science.gov (United States)

    Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon

    2008-11-01

    During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

  15. Solar Secure Schools: Strategies and Guidelines; October 2004--April 2005

    Energy Technology Data Exchange (ETDEWEB)

    Braun, G. W.; Varadi, P. F.

    2006-01-01

    This report explores the technical and economic aspects of installing solar power (photovoltaic aka PV) systems on schools to improve the schools' energy security and provide power during disasters.

  16. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    Science.gov (United States)

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  17. Safety and Security in Schools in KwaZulu-Natal

    Science.gov (United States)

    White, C. J.; Gina, J. M.; Coetzee, I. E. M.

    2015-01-01

    This article is based on research conducted on the topic: "Safety and security in schools: The case of KwaZulu-Natal." For the research project a purposive sample consisting of secondary school learners, teachers, school governing body chairpersons and principals were selected from the rural and township schools used in this study to…

  18. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  19. Security Measures to Protect Mobile Agents

    Science.gov (United States)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  20. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    Science.gov (United States)

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  1. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2008-01-01

    ... by Section 1308 of Public Law 110-28 and Section 1224 of Public Law 110-181. The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  2. Summary Report for the Radiation Detection for Nuclear Security Summer School 2012

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C.; Baciak, James E.; Stave, Jean A.

    2012-08-22

    The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the inaugural Radiation Detection for Nuclear Security Summer School from June 11 – 22, 2012. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. The first week of the summer school focused on the foundational knowledge required by technology practitioners; the second week focused on contemporary applications. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security.

  3. Safety and Security at School: A Pedagogical Perspective

    Science.gov (United States)

    de Waal, Elda; Grosser, M. M.

    2009-01-01

    Education law and policy currently focus on broader physical aspects of safety and security at schools, as well as, for example, on pedagogical insecurity such as is caused by discriminatory teaching, but law and policy have yet to pay attention to the overall and far-reaching pedagogical safety and security of learners. By means of a descriptive…

  4. Homeland Security Planning for Urban Area Schools

    Science.gov (United States)

    2008-03-01

    as these have already been used successfully in school attacks such as those used in the Columbine massacre . Aum Shinrikyo, now known as Aleph, 36...terrorist siege. Equally disturbing was the school massacre in "Netiv Meir," an elementary school in Ma’a lot, Israel, on May 15, 1974, the twenty-sixth...Immediate Consumer The immediate consumer will be School District 207, which is comprised of three large high schools with a combined student enrollment

  5. The Evaluation of Teachers’ Security at School

    Directory of Open Access Journals (Sweden)

    Valdas Pruskus

    2011-06-01

    Full Text Available In modern society teachers experience a significant increase in psychological as well as physical violence of pupils, which, consequently, aggravates the overall educational process and demotivates teachers to carry out their duties properly. On the basis of the research carried out, the article analyses feelings of teachers working in schools of different types and their reaction to experienced insecurity. It is shown that the manifestation of teachers’ insecurity experienced at schools of different types is different: teachers of primary schools suffer from economic insecurity the most, teachers of basic schools suffer from economic and psychological insecurity, and teachers of secondary schools and gymnasiums suffer from psychological insecurity.

  6. Enhancing QKD security with weak measurements

    Science.gov (United States)

    Farinholt, Jacob M.; Troupe, James E.

    2016-10-01

    Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.

  7. Measuring Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Brochure provides and overview of the analysis and results. Readers interested in an in-depth discussion of methodology are referred to the MOSES Working Paper.

  8. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  9. Radon measurements in 130 schools

    International Nuclear Information System (INIS)

    Peake, R.T.; Schmidt, A.; MacWaters, J.T.; Chmelynski, H.

    1990-01-01

    During the winter of 1989, Rn screening measurements were made in 130 schools distributed across the United States. The primary purpose of the paper is to identify schools suitable for a year-long follow-up study, the results of which will be used to update EPA's guidance for Rn testing in schools. The 130 schools were selected nonrandomly using school characteristics and accessibility in areas where there were known or suspected Rn problems in homes. Levels found in this screening study may indicate the potential for Rn problems in US schools. Over half of the 130 schools tested had at least one radon measurement ≥4 pCi/L, and nearly 20% of the 3028 rooms measured ≥4 pCi/L. The number of rooms ≥4 pCi/L is often three rooms or less. However, schools with more than five rooms ≥4 pCi/L are common in some areas. The data include schools that could be typical of much of the US school population as well as schools which exhibit extreme radon problems, such as those tested in Nashville, TN and Spokane, WA

  10. Measuring Emotion Socialization in Schools

    Science.gov (United States)

    Horner, Christy G.; Wallace, Tanner L.

    2013-01-01

    Background: Understanding how school personnel can best support students' development of communication skills around feelings is critical to long-term health outcomes. The measurement of emotion socialization in schools facilitates future research in this area; we review existing measures of emotion socialization to assess their applicability…

  11. Unsafe Gods: Security, Secularism and Schooling

    Science.gov (United States)

    Davies, Lynn

    2014-01-01

    This book makes the compelling argument that religion can be complicit in conflict and that a new secularism is vital to foster security. Using insights from complexity science, it shows how dynamic secularism can be used to accommodate diverse faiths and beliefs within worldly politics. Exploration of the interplay of religion and education in…

  12. Status of School Safety and Security among Elementary Schools in the Fifth Class Municipality

    Directory of Open Access Journals (Sweden)

    Cresente E. Glariana

    2015-12-01

    Full Text Available This study attempted to determine the status of school safety and security in terms of the school sites, school playground, school canteen services, water safety, fire safety, campus security, building security, and sanitary facilities situation in eight (8 elementary schools in Libertad town. The descriptive survey was used to find out the status of school safety and security in the elementary schools of Libertad, Misamis Oriental. A checklist on the standards of facilities as implemented by the Department of Education was used to gather the data. Checklist was based from the 2010 Educational Facilities Manual. Evaluation based on the checklist showed that some of standards on 2010 Educational Facilities Manual were not observed. The schools have not complied with the requirements and specifications. The evaluation showed further that most of the schools did not comply within the standards set by the 2010 Educational Facilities Manual. School authorities may review the standards in the 2010 Educational Facilities Manual. The school should try to meet the standard to ensure safety and security of the pupils. Action plan may be prepared to be implemented in case of emergency.

  13. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2005-01-01

    .... The initial section of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, economic progress, and achieving a stable security environment in Iraq...

  14. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2006-01-01

    ... of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, strengthening economic activity, and achieving a stable security environment in Iraq...

  15. MCPS School Safety and Security at a Glance 2009-2010

    Science.gov (United States)

    Montgomery County Public Schools, 2010

    2010-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) public schools. The information is presented for each school.…

  16. MCPS School Safety and Security at a Glance 2008-2009

    Science.gov (United States)

    Montgomery County Public Schools, 2009

    2009-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…

  17. MCPS School Safety and Security at a Glance 2010-2011

    Science.gov (United States)

    Montgomery County Public Schools, 2011

    2011-01-01

    "MCPS School Safety and Security at a Glance" provides, in a single document, information about the reporting of incidents related to school safety and security, school climate, local school safety program descriptions, and serious incidents in all Montgomery County (Maryland) Public Schools. The information is presented for each school.…

  18. Measuring the Perception of Travel Security – Comparative Analysis of Students in Two Different Fields: Tourism and Security

    Directory of Open Access Journals (Sweden)

    Sebastjan Repnik

    2015-01-01

    Full Text Available The aim of the research was to determine how students/respondents perceive security on their travels in Europe. The respondents belong to two different study programmes, one focusing on the field of security (Faculty of Criminal Justice and Security, University of Maribor and the other on the field of tourism (Higher Vocational School for Catering and Tourism. Our main presumption was that students of the two institutions developed a different attitude towards travel security since their studies focus on two substantively different academic-professional fields. We examined their attitude towards security factors such as: security climate, self-protection and collective security. In our research we included a sample of 100 students/respondents. We used an instrument in the form of a questionnaire for the quantitative measurement of responses on a 5-point Likert scale. To portray the results of the research we also used various statistical indicators in the computer programme SPSS such as: arithmetic mean, Man-Whitney test, frequency distribution of responses, where independent variables are displayed. The findings suggest that the students/respondents attitude towards safety and their expectations on individual elements of all three security factors differ in the two target groups. The expectations of students/respondents of FCJS regarding the implementation and provision of security are higher compared to students/respondents of HVC. Respondents have different experience with security on their travels, as the number of travels varies quite substantially between students. Both institutions can use the results of the research in the evaluation processes of their study programmes. On the basis of the results of the research it is substantiated that the field and content of study have an impact on the students’ attitude to elements of security while travelling. The findings are intended to all researchers in the field of security and tourism, as

  19. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    Science.gov (United States)

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  20. Information Security Management Practices of K-12 School Districts

    Science.gov (United States)

    Nyachwaya, Samson

    2013-01-01

    The research problem addressed in this quantitative correlational study was the inadequacy of sound information security management (ISM) practices in K-12 school districts, despite their increasing ownership of information assets. Researchers have linked organizational and sociotechnical factors to the implementation of information security…

  1. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  2. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2006-01-01

    .... The first section of the report, Stability and Security in Iraq, describes trends and progress towards meeting goals for political stability, strengthening economic activity, and achieving a stable...

  3. Education secured? The school performance of adolescents in secure residential youth care

    NARCIS (Netherlands)

    Harder, Annemiek T.; Huyghen, Anne-Marie N.; Knot-Dickscheit, Jana; Kalverboer, Margrite E.; Köngeter, Stefan; Zeller, Maren; Knorth, Erik J.

    Despite poor school performance by adolescents in secure residential care and the potential importance of education during care, little is known about how to achieve academic success with these adolescents. Therefore, the aim of the present study is to assess adolescents' academic achievement during

  4. Measuring emotion socialization in schools.

    Science.gov (United States)

    Horner, Christy G; Wallace, Tanner L

    2013-10-01

    Understanding how school personnel can best support students' development of communication skills around feelings is critical to long-term health outcomes. The measurement of emotion socialization in schools facilitates future research in this area; we review existing measures of emotion socialization to assess their applicability to school-based health studies. A content analysis of four emotion socialization measures was conducted. Inclusion criteria included: high frequency of use in prior research, established documentation of validity and reliability, and sufficient description of measurement procedures. Four dimensions emerged as particularly salient to a measure's future relevance and applicability to school-based health studies: (1) methods of measurement; (2) mode and agent of socialization; (3) type of emotion; and (4) structure versus function of socializing behavior. Future measurement strategies should address (1) the structures of emotion socializing processes; (2) diverse socializing agents such as teachers, peers, and administrators; (3) the intended functions of such processes; (4) student perceptions of and responses to such processes; and (5) the complex interactions of these factors across contexts. Strategies attending to these components will permit future studies of school-based emotion socializing processes to determine how they enhance health and reduce health risks. © 2013, American School Health Association.

  5. Measuring relational security in forensic mental health services.

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  6. Measuring relational security in forensic mental health services

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  7. Delictual Liability of the School Sports Coach - A Security Matter

    Directory of Open Access Journals (Sweden)

    JP Rossouw

    2011-10-01

    of all educators stems from the special relationship between an educator and a learner. Not acting to ensure the safety of a participant constitutes wrongfulness on the side of the educator-coach, which may lead to being held liable for damage to the participant. This article specifically considers the higher standard of care expected from the educator-coach, as compared to the normal reasonable person, based on the former's specific training in working with learners. The acts or omissions of higher qualified and more experienced educator-coaches will also be measured against a higher standard.This article concludes with the recommendation that educator-coaches should not be overly reassured by section 60 of the South African Schools Act. Ensuring the safety and security of learners should still be the main priority for all educators. Educator-coaches should remember that, true to their calling as educators, and consistent with section 28(2 of the Constitution, a child's best interests are of paramount importance in every matter concerning the child.

  8. ANTI-CORRUPTION MEASURES FOR CORPORATE SECURITY

    Directory of Open Access Journals (Sweden)

    Natasha Georgieva Hadji Krsteski

    2017-04-01

    Full Text Available Corporate security should commit to ethical management and raising the quality of companies and markets through improving cooperation and transparency by applying anticorruption measures such as accepting a code of ethics; respect and follow international business principles for dealing with bribery; improve their transparency - via access to information; involvement in politics to protect persons who disclose corruption cases; and improving corporate governance - through active mutual discussions on adjustment of legal regulations. Research methods used in the paper are: qualitative analysis of secondary data obtained from relevant institutions. Results obtained from the survey include fighting corruption in corporations must find a unique solution that is long-term strategy developed transparent society crucial criteria and principles to meet the political criteria by the fulfillment of anti-corruption standards; it requires continuous cooperation of public and private sector, NGOs and the general corpus of all stakeholders in the country against corruption; the lack of a legal framework or platform for establishing public and private partnerships, is an important factor for anti-corruption measures to improve corporate governance; mechanisms for cooperation does not seem sufficiently developed between the public, private, political and civil society; the most important factor to tackle corruption is to adopt a law on public prosecutors and determination of higher norms and standards. Conclusions drawn from the survey: in the area of pre-trial procedure requires shifting responsibilities of Interior Ministry body training in the area of the judicial system; it is necessary to change the Criminal Code and Criminal Procedure Code by changing certain legal provisions which refer to the Agency for money laundering SCCP, a financial police and overall legislation.

  9. Challenges to regional security and disarmament measures

    International Nuclear Information System (INIS)

    Clements, K.P.

    1993-01-01

    The new agenda for peace is providing an extremely useful road map for current international and regional discussions about new ways and means of securing and maintaining peace and security. It underlines the central role of the United nations Security Council in relation to international conflicts and the maintenance of the peace, but it underlines an increasingly important role of the regional organisations as well. In all, there is a recognition that the end of the cold war has generated possibilities for peace-building that have not existed before. To take advantage of these opportunities requires an enhancement of consultation and dialogue at national, regional and global levels so that all nations and all peoples feel and know that they have a stake in the new peace and security architecture that will govern international relations into the twenty first century

  10. Summary Report for the Radiation Detection for Nuclear Security Summer School 2014

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Baciak, James E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodring, Mitchell L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Jenno, Diana M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-09-01

    Executive Summary The Pacific Northwest National Laboratory (PNNL) hosted students from across the United States at the 3rd Radiation Detection for Nuclear Security Summer School from 16 – 27 June 2014. The summer school provided students with a unique understanding of nuclear security challenges faced in the field and exposed them to the technical foundations, analyses, and insight that will be required by future leaders in technology development and implementation. The course heavily emphasized laboratory and field demonstrations including direct measurements of special nuclear material. Student evaluations and feedback from student advisors indicates that the summer school achieved its objectives of 1) exposing students to the range of nuclear security applications for which radiation detection is necessary, 2) articulating the relevance of student research into the broader context, and 3) exciting students about the possibility of future careers in nuclear security. In fact, we are beginning to see previous students both enroll in graduate programs (former undergraduates) and complete internships at agencies like the National Nuclear Security Administration.

  11. Measuring energy security. A conceptual note

    Energy Technology Data Exchange (ETDEWEB)

    Frondel, Manuel; Schmidt, Christoph M.

    2008-11-06

    Along with the oil price, concerns about the security of energy supply have soared once again in recent years.Yet, more than 30 years after the OPEC oil embargo in 1973, energy security still remains a diffuse concept. This paper conceives a statistical indicator that aims at characterizing the energy supply risk of nations that are heavily dependent on energy imports. Our indicator condenses the bulk of empirical information on the imports of fossil fuels originating from a multitude of export countries as well as data on the indigenous contribution to the domestic energy supply into a single parameter. Applying the proposed concept to empirical energy data on Germany and the U.S. (1980-2004), we find that there is a large gap in the energy supply risks between both countries, with Germany suffering much more from a tensed energy supply situation today than the U.S. (orig.)

  12. Measuring the security of energy exports demand in OPEC economies

    International Nuclear Information System (INIS)

    Dike, Jude Chukwudi

    2013-01-01

    One of the objectives of OPEC is the security of demand for the crude oil exports of its members. Achieving this objective is imperative with the projected decline in OECD countries' crude oil demand among other crude oil demand shocks. This paper focuses on determining the external crude oil demand security risks of OPEC member states. In assessing these risks, this study introduces two indexes. The first index, Risky Energy Exports Demand (REED), indicates the level of energy export demand security risks for OPEC members. It combines measures of export dependence, economic dependence, monopsony risk and transportation risk. The second index, Contribution to OPEC Risk Exposure (CORE), indicates the individual contribution of the OPEC members to OPEC's risk exposure. This study utilises the disaggregated index approach in measuring energy demand security risks for crude oil and natural gas and involves a country level analysis. With the disaggregated approach, the study shows that OPEC's energy export demand security risks differ across countries and energy types. - Highlights: • REED and CORE indexes are suitable measures for energy exports demand security risk. • The indexes show that energy demand security risk is different for each OPEC country. • The countries contribution to OPEC's energy demand security risk is also different. • The outcome is necessary for OPEC's common energy and climate change policies. • The outcome makes a case for oil demand security as a topical issue in the literature

  13. Measuring the Foundation of Homeland Security

    Science.gov (United States)

    2007-03-01

    Pirak Kevin Eack Susan Pyle Chuck Eaneff Joseph Saitta Susan Fernandez Shelly Schechter Helen Fitzpatrick Rick Schwein Jay...multiple disciplines. The scope of this literature review is to cast a broad net and then narrow to specific literature related to Homeland Security...Suez Canal. His successes as a planner, diplomat and promoter made him the most celebrated man in Europe. Because of these successes, De Lesseps

  14. Protecting Our Future--Developing a National School Security Standard

    Science.gov (United States)

    2013-12-01

    Safety Policy (Washington, DC: Congressional Research Service, 2013). 9 alienation, rumination on...The First of All Fears. Shoemaker contends the likelihood of a terrorist attack on an American school is minimal. He concludes that risk management...but also deftly explain why the targeting of schools by terrorists are rare events and therefore require measured responses.43 They contend that

  15. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  16. A Survey on Security-Aware Measurement in SDN

    Directory of Open Access Journals (Sweden)

    Heng Zhang

    2018-01-01

    Full Text Available Software-defined networking (SDN is one of the most prevailing networking paradigms in current and next-generation networks. Basically, the highly featured separation of control and data planes makes SDN a proper solution towards many practical problems that challenge legacy networks, for example, energy efficiency, dynamic network configuration, agile network measurement, and flexible network deployment. Although the SDN and its applications have been extensively studied for several years, the research of SDN security is still in its infancy. Typically, the SDN suffers from architecture defect and OpenFlow protocol loopholes such as single controller problem, deficiency of communication verification, and network resources constraint. Hence, network measurement is a fundamental technique of protecting SDN against the above security threats. Specifically, network measurement aims to understand and quantify a variety of network behaviors to facilitate network management and monitoring, anomaly detection, network troubleshooting, and the establishment of security mechanisms. In this paper, we present a systematic survey on security-aware measurement technology in SDN. In particular, we first review the basic architecture of SDN and corresponding security challenges. Then, we investigate two performance measurement techniques in SDN, namely, link latency and available bandwidth measurements. After that, we further provide a general overview of topology measurement in SDN including intradomain and interdomain topology discovering techniques. Finally, we list three interesting future directions of security-aware measurement in SDN followed by giving conclusion remarks.

  17. A Security Risk Measurement for the RAdAC Model

    National Research Council Canada - National Science Library

    Britton, David W; Brown, Ian A

    2007-01-01

    .... The intent is to quantify the risk involved in a single information transaction. Additionally, this thesis will attempt to identify the risk factors involved when calculating the total security risk measurement...

  18. Validity evidence for the Security Scale as a measure of perceived attachment security in adolescence.

    Science.gov (United States)

    Van Ryzin, Mark J; Leve, Leslie D

    2012-04-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  19. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability

    National Research Council Canada - National Science Library

    Hoaglund, Robert; Gazda, Walter

    2007-01-01

    The goal of this analysis is to provide ASCO and its customers with a comprehensive approach to the development of quantitative performance measures to assess security improvements to the port system...

  20. Radioactive Sources in Medicine: Impact of Additional Security Measures

    International Nuclear Information System (INIS)

    Classic, K. L.; Vetter, R. J.; Nelson, K. L.

    2004-01-01

    For many years, medical centers and hospitals have utilized appropriate security measures to prevent theft or unauthorized use of radioactive materials. Recent anxiety about orphan sources and terrorism has heightened concern about diversion of radioactive sources for purposes of constructing a radiological dispersion device. Some medical centers and hospitals may have responded by conducting threat assessments and incorporating additional measures into their security plans, but uniform recommendations or regulations have not been promulgated by regulatory agencies. The International Atomic Energy Agency drafted interim guidance for the purpose of assisting member states in deciding what security measures should be taken for various radioactive sources. The recommendations are aimed at regulators, but suppliers and users also may find the recommendations to be helpful. The purpose of this paper is to describe threat assessments and additional security actions that were taken by one large and one medium-sized medical center and the impact these measures had on operations. Both medical centers possess blood bank irradiators, low-dose-rate therapy sources, and Mo-99/Tc-99m generators that are common to many health care organizations. Other medical devices that were evaluated include high-dose-rate after loaders, intravascular brachytherapy sources, a Co-60 stereotactic surgery unit, and self-shielded irradiators used in biomedical research. This paper will discuss the impact additional security has had on practices that utilize these sources, cost of various security alternatives, and the importance of a security culture in assuring the integrity of security measures without negatively impacting beneficial use of these sources. (Author) 10 refs

  1. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  2. Security measures in transport of radiation source in Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Mohammad, Alslman [Korea Advanced Institute of Science and Technology, Kaist Daejeon (Korea, Republic of); Choi, Kwang Sik [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2011-05-15

    Radioactive materials are used in Jordan for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported, therefore trans-boundary movement is a significant factor in consideration of security measures during movement of these sources. After 11/9 2001 event, IAEA efforts began to focus and concentrate on security in transport of radioactive materials, after the emergence of risks of using these sources in terrorist activities. In 2002, Efforts were initiated by the IAEA to provide additional guidance for security in the transport of radioactive materials, based upon the new security requirements in the Recommendations on the Transport of Dangerous Goods. This paper reviews some of the measures relating to the transport of radioactive materials in Jordan

  3. Obesity and food security in Yazd primary school students

    Directory of Open Access Journals (Sweden)

    Karam soltani Z

    2007-09-01

    Full Text Available Background: Food security is defined as access, for all people at all times, to enough food for an active and healthy life. Food security includes: 1 the ready availability of nutritionally-adequate and safe food, and 2 an assured ability to acquire acceptable foods in socially acceptable ways. The increase in childhood as well as adulthood obesity and food insecurity has caused many recent investigations on obesity, food insecurity and some associated factors. However, there appears to be a lack of published information regarding some factors affecting obesity and food insecurity. This study aimed to determine the prevalence obesity and food insecurity and some associated factors among Yazd province primary school students in Iran.Methods: Using two-stage cluster sampling, a total of 3245 students (1587 boys and 1658 girls, aged 9-11 years, were randomly selected from primary school pupils in Yazd, Iran. From these, 187 students having BMIs ≥95th percentile, as defined by Hosseini et al. (1999, were identified as obese and 187 pupils of the same age and gender having BMIs between the 15th and 85th percentiles were selected as controls. Data were collected using 24-hour food-recall and USDA food insecurity questionnaires.Results: We found that the prevalence of obesity among students aged 9-11 years was 13.3%, and the prevalence of food insecurity was 30.5%. Daily energy intakes, compared to those recommended by the RDA, carbohydrate intake and energy percentages from proteins and carbohydrates were higher in obese children, and all macronutrient intakes per kilogram of body weight were significantly higher. An association between obesity and food insecurity was observed with adjusted fat intake.Conclusion: In conclusion, the prevalence of obesity and food insecurity is high among Yazd primary school students, and high-level intakes of energy, protein, carbohydrate are associated with obesity. Furthermore, variation in the rate of fat intake

  4. Measurable Control System Security through Ideal Driven Technical Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based

  5. Measurements Matter in Nuclear Safeguards & Security

    International Nuclear Information System (INIS)

    Aregbe, Y.; Jakopic, R.; Richter, S.; Schillebeeckx, P.; Hult, M.

    2015-01-01

    The deliverable of any laboratory is a measurement result with stated uncertainty and traceability (ISO/IEC 17025: 2005). Measurement results, particularly in safeguards, have to be accurate, comparable and traceable to a stated reference, preferably to the SI. Results provided by operator-, safeguards- or network laboratories have to be in compliance with specific quality goals for nuclear material and environmental sample analysis. Metrological quality control tools are prerequisites to build up confidence in measurement results that have to be translated into meaningful safeguards conclusions or to demonstrate conformity of findings with declared processes. The European Commission—Joint Research Centre (EC–JRC) has dedicated facilities, laboratories and projects to provide certified nuclear reference materials (CRM), to develop reference methods and to organize inter-laboratory comparisons (ILC) in compliance with ISO Guide 34, ISO17025 and ISO17043, including respective training. Recent examples are: – cooperation with the JAEA to investigate on the application of Neutron Resonance Densitometry (NRD) to quantify the amount of special nuclear material in particlelike debris of melted fuel as formed in the nuclear accident in Fukushima – training in metrology and gamma-ray spectrometry for EURATOM safeguards inspectors – development of uranium reference particle standards under a new EC support task to the IAEA. Currently, the JRC puts major efforts in producing CRMs and conformity assessment tools for “age-dating” of uranium and plutonium samples. They are needed for method validation in determining the date of the last chemical separation of uranium or plutonium from their daughter nuclides. These type of CRMs are not only needed in nuclear safeguards and forensics, but could support in the future a possible new type of “verification mechanism” as part of the Fissile Material Cut-off Treaty (FMCT), since measurements and measurement standards

  6. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-07-01

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients ( p  = 0.0001) and 50 of 97 reported inconvenience when traveling ( n  = 50 of 97 patients; p  = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  7. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  8. Gamification for Measuring Cyber Security Situational Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  9. Children's Food Security and Intakes from School Meals. Final Report. Contractor and Cooperator Report No. 61

    Science.gov (United States)

    Potamites, Elizabeth; Gordon, Anne

    2010-01-01

    Using 2005 data from the U.S. Department of Agriculture's Third School Nutrition Dietary Assessment survey, this study examines the contribution of school meals to the food and nutrient intake of children in food-secure, marginally secure, and food-insecure households. The study finds that children from food-insecure and marginally secure…

  10. 76 FR 54196 - Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee

    Science.gov (United States)

    2011-08-31

    ... DEPARTMENT OF AGRICULTURE Forest Service Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: In accordance with the Secure Rural Schools and Community Self Determination Act of 2000 (Pub. L. 106-393), [as...

  11. Conceptualizing and measuring energy security: A synthesized approach

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Mukherjee, Ishani

    2011-01-01

    This article provides a synthesized, workable framework for analyzing national energy security policies and performance. Drawn from research interviews, survey results, a focused workshop, and an extensive literature review, this article proposes that energy security ought to be comprised of five dimensions related to availability, affordability, technology development, sustainability, and regulation. We then break these five dimensions down into 20 components related to security of supply and production, dependency, and diversification for availability; price stability, access and equity, decentralization, and low prices for affordability; innovation and research, safety and reliability, resilience, energy efficiency, and investment for technology development; land use, water, climate change, and air pollution for sustainability; and governance, trade, competition, and knowledge for sound regulation. Further still, our synthesis lists 320 simple indicators and 52 complex indicators that policymakers and scholars can use to analyze, measure, track, and compare national performance on energy security. The article concludes by offering implications for energy policy more broadly. -- Highlights: → Energy security should consist of five dimensions related to availability, affordability, technology development, sustainability, and regulation. → The dimensions of energy security can be broken down into 20 components. → These components can be distilled into 320 simple indicators and 52 complex indicators.

  12. School Climate Measurement and Analysis

    Science.gov (United States)

    Faster, Darlene; Lopez, Daisy

    2013-01-01

    Today, school climate assessment has become an increasingly important and valued aspect of district, state, and federal policy. Recognizing that effective school climate improvement efforts are grounded in valid and reliable data, the Federal Department of Education launched the Safe and Supportive Schools grant in 2010 to provide 11 states with…

  13. Measuring Entrepreneurship in Business Schools

    Science.gov (United States)

    Hazeldine, Mary; Miles, Morgan

    2007-01-01

    The recent positions of the Association to Advance Collegiate Schools of Business (AACSB) and the European Foundation for Management Developments (EQUIS) on the value of entrepreneurship suggest a more entrepreneurial perspective in a business school's culture and strategic processes for obtaining and sustaining a business school's reputation. The…

  14. Measuring the energy security implications of fossil fuel resource concentration

    International Nuclear Information System (INIS)

    Lefevre, Nicolas

    2010-01-01

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies-France and the United Kingdom-looking at the evolution of both indexes to 2030.

  15. Measuring the energy security implications of fossil fuel resource concentration

    Energy Technology Data Exchange (ETDEWEB)

    Lefevre, Nicolas [Woodrow Wilson School of Public and International Affairs, Princeton University, New Jersey (United States)

    2010-04-15

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies - France and the United Kingdom - looking at the evolution of both indexes to 2030. (author)

  16. A Secure System Architecture for Measuring Instruments in Legal Metrology

    Directory of Open Access Journals (Sweden)

    Daniel Peters

    2015-03-01

    Full Text Available Embedded systems show the tendency of becoming more and more connected. This fact combined with the trend towards the Internet of Things, from which measuring instruments are not immune (e.g., smart meters, lets one assume that security in measuring instruments will inevitably play an important role soon. Additionally, measuring instruments have adopted general-purpose operating systems to offer the user a broader functionality that is not necessarily restricted towards measurement alone. In this paper, a flexible software system architecture is presented that addresses these challenges within the framework of essential requirements laid down in the Measuring Instruments Directive of the European Union. This system architecture tries to eliminate the risks general-purpose operating systems have by wrapping them, together with dedicated applications, in secure sandboxes, while supervising the communication between the essential parts and the outside world.

  17. Impacts of security dimensions on awareness measurement in ...

    African Journals Online (AJOL)

    A big challenge facing Social Networks (SNs) and other organisations has been what to measure when determining the adequacy and effectiveness of awareness programmes. This study defines security dimension as Knowledge, Attitude and Behaviour, and identifies them as the main influencing factors to consider in ...

  18. Towards improving security measures in Nigeria University Libraries ...

    African Journals Online (AJOL)

    A questionnaire designed by the researchers titled “Towards Improving Security Measures in Nigerian University Libraries (TISMINUL)” was used to collect the needed data. The questionnaire was designed in two parts. Part one was to gather information on the size of collection, frequency of stock taking and book loss.

  19. Validation of the "Security Needs Assessment Profile" for measuring the profiles of security needs of Chinese forensic psychiatric inpatients.

    Science.gov (United States)

    Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M

    Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Measuring food security in the Republic of Serbia

    Directory of Open Access Journals (Sweden)

    Papić-Brankov Tatjana

    2015-01-01

    Full Text Available The overall goal of this paper is analysis of Serbian food security system across a set of indicators, with special emphasis to 2012 Global Food Security Index (GFSI. The results generally provided two major weakness of the Serbian food system: Gross domestic product (GDP per capita based on purchasing power parity and Corruption. Paper points out the need to improve the current food security system and proposed a number of measures for its improvement. Among other things appropriate nutritional standards and strategies will have to be adopted; investors' confidence must be strengthened and must be dealt with in a serious fight against corruption in the agriculture and food sector. The development of rural areas, reducing regional disparities and stabilization of agricultural production will certainly contribute to the tough battle against poverty.

  1. Internal Interface Diversification as a Security Measure in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sampsa Rauti

    2018-03-01

    Full Text Available More actuator and sensor devices are connected to the Internet of Things (IoT every day, and the network keeps growing, while software security of the devices is often incomplete. Sensor networks and the IoT in general currently cover a large number of devices with an identical internal interface structure. By diversifying the internal interfaces, the interfaces on each node of the network are made unique, and it is possible to break the software monoculture of easily exploitable identical systems. This paper proposes internal interface diversification as a security measure for sensor networks. We conduct a study on diversifiable internal interfaces in 20 IoT operating systems. We also present two proof-of-concept implementations and perform experiments to gauge the feasibility in the IoT environment. Internal interface diversification has practical limitations, and not all IoT operating systems have that many diversifiable interfaces. However, because of low resource requirements, compatibility with other security measures and wide applicability to several interfaces, we believe internal interface diversification is a promising and effective approach for securing nodes in sensor networks.

  2. Measurements of magnetic field sources in schools

    International Nuclear Information System (INIS)

    Johnson, G.B.

    1992-01-01

    The Electrical Systems Division of the Electric Power Research Institute (EPRI) has initiated several research projects to investigate magnetic field levels, their characteristics, and their sources. This paper describes measurements of magnetic field sources in schools. Magnetic field measurements were made at four schools in the service areas of two utility companies. Magnetic field measurements included profiles of the magnetic field versus distance near power lines, around the perimeter of the school buildings, and at several locations within each school. Twenty-four hour measurements were also made to record the temporal variation of the magnetic field at several locations at each school. The instrumentation, measurement techniques, and magnetic field sources identified are discussed

  3. [Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].

    Science.gov (United States)

    Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo

    2016-01-01

    Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes.

  4. Measuring School Climate: An Overview of Measurement Scales

    Science.gov (United States)

    Kohl, Diane; Recchia, Sophie; Steffgen, Georges

    2013-01-01

    Background: School climate is a heterogeneous concept with a multitude of standardised and validated instruments available to measure it. Purpose: This overview of measurement scales aims to provide researchers with short summaries of some of the self-report instruments in existence, especially in relation to the link between school climate and…

  5. Perceived Attachment Security to Father, Academic Self-Concept and School Performance in Language Mastery

    Science.gov (United States)

    Bacro, Fabien

    2012-01-01

    This study examined the relations between 8-12-year-olds' perceived attachment security to father, academic self-concept and school performance in language mastery. One hundred and twenty two French students' perceptions of attachment to mother and to father were explored with the Security Scale and their academic self-concept was assessed with…

  6. Measuring energy security. Can the United States achieve oil independence?

    International Nuclear Information System (INIS)

    Greene, David L.

    2010-01-01

    Stochastic simulation of the direct economic costs of oil dependence in an uncertain future is proposed as a useful metric of oil dependence. The market failure from which these costs arise is imperfect competition in the world oil market, chiefly as a consequence of the use of market power by the Organization of the Petroleum Exporting Countries (OPEC) cartel. Oil dependence costs can be substantial. It is estimated that oil dependence costs to the US economy in 2008 will exceed $500 billion. Other costs, such as military expenditures or foreign policy constraints are deemed to be largely derivative of the actual or potential economic costs of oil dependence. The use of quantifiable economic costs as a security metric leads to a measurable definition of oil independence, or oil security, which can be used to test the ability of specific policies to achieve oil independence in an uncertain future. (author)

  7. Security of Energy Supply - Indicators for Measuring Vulnerability and Risk

    International Nuclear Information System (INIS)

    Heinrich, C.

    2010-01-01

    In an era of increasing globalization, secure and affordable energy supplies are an essential requirement for economies to work, much less develop and grow in the long term. The present study, Energy security of supply - indicators for measuring vulnerability and risk, develops a broad methodical assessment concept to raise awareness among policy makers and the public regarding the vulnerability of energy supplies to potential energy crises. It explores the different aspects of vulnerability, from the primary energy level to energy infrastructure (storage, networks, power plant parks) to the efficiency and cost of energy consumption for end users. The individual characteristics of the formal concept were quantitatively evaluated for several OECD regions (Germany, UK, Sweden, Poland, Italy, France and the US) using a comprehensive empirical database and reduced to a single indicator for assessing energy supply vulnerability. Part of the database comprises historical observations for the period between 1978 and 2007.(author).

  8. Measuring School Psychology Trainee Self-Efficacy

    Science.gov (United States)

    Lockwood, Adam B.; Mcclure, John; Sealander, Karen; Baker, Courtney N.

    2017-01-01

    There is an ever-increasing need for school psychology training programs to demonstrate their ability to produce competent practitioners. One method of addressing this need is through the assessment of self-efficacy. However, little research on self-efficacy in school psychology exists likely due to the lack of a psychometrically sound measure of…

  9. Higher Stakes--The Hidden Risks of School Security Fences for Children's Learning Environments

    Science.gov (United States)

    Rooney, Tonya

    2015-01-01

    In a move away from the open or low-fenced grounds that have traditionally been a feature of Australian school design, the last decade has seen a growth in the installation of high-security fences around schools. These structures, far from being passive and neutral, act to redefine the possibilities for movement and connectivity in the local…

  10. Attachment security, personality, and adjustment of elementary school children.

    Science.gov (United States)

    Goldner, Limor; Scharf, Miri

    2013-01-01

    Children's development is assumed to be closely related to their attachment security and their personality. The authors' aim was to examine the joint contribution of attachment security and personality traits to children's adjustment by examining diverse children's outcomes (emotional symptoms, social functioning, and behavioral problems) and using various perspectives (children, parents, and teachers). The sample comprised 247 8-12-year-old children from low socioeconomic status neighborhoods. Personality and attachment contribute to the different domains of adjustment. In cases of moderation, attachment security moderates the implications of personality traits on children's adjustment. The findings highlight the contribution of positive personality tendencies in playing down the difficulties of insecurely attached children.

  11. Decision Model for U.S.- Mexico Border Security Measures

    Science.gov (United States)

    2017-09-01

    missions that the I&A focuses on is, “border security, including narcotics smuggling, alien and human smuggling, and money laundering ...and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION

  12. Violence in American Schools: The Impact of the Newtown School Shooting on School Practices and Programs, School Security Staff, Staff Training, and Security Budgets

    Science.gov (United States)

    O'Donnell, Robert William

    2016-01-01

    The purpose of this study was to examine changes implemented by public school district personnel in response to the Newtown school shooting that occurred on December 14, 2012. The researcher used the U.S. Department of Education's National Center for Educational Statistics (NCES) School Survey on Crime and Safety (SSOCS) to gather quantitative…

  13. Newer Technologies for School Security. ERIC Digest Number 145.

    Science.gov (United States)

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  14. Juggling Act: Balancing Safety, Security, and Yield in School Investments.

    Science.gov (United States)

    Sallack, David J.

    2001-01-01

    Although state laws governing school district investing are quite conservative, there have been some notable investment failures leading to the loss of public funds. School districts must beware three kinds of investment risks involving credit, market, and interest rates and consider safety, legality, liquidity, and cash-flow requirements. (MLH)

  15. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Science.gov (United States)

    2010-07-01

    ... stores and industrial supplies. (a) General. The OCS facility owner or operator must ensure that security...). These additional security measures may include: (1) Intensifying inspection of the stores or industrial... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for delivery of...

  16. ROLE OF GRASSROOTS ENVIRONMENTAL LITERACY: The case of water security at Bwaila Secondary School in Malawi

    Science.gov (United States)

    Chasukwa Mwalwenje, Yvonne; Chasukwa, Steria

    2015-04-01

    water. The main challenge is the degradation of water resources which result into siltation that blocks the water sources due to rain while in the dry season the water level in reservoirs goes down. Other challenges include inadequate service coverage, insufficient literacy on climate change, inadequate mitigation measures for water related disasters and inadequate promotion of hygiene and sanitation. Bwaila Secondary School in Malawi is no exception in experiencing inadequate water service coverage amidst opportunities such as availability of relatively abundant water resources, political will, active women and youth. The formal education curriculum in secondary schools has enriched students' knowledge of environmental management in subjects such as Geography, Agriculture and Biology to improve their understanding of natural resource management. However, the primary gap is that students do not use the skills in environmental management acquired from the formal school setting in their day to day life henceforth rendering it to be a mere academic exercise confined within classroom walls. It is against such background that Grassroots Environmental Literacy (GEL), an environmental management social marketing franchise in non-formal education was established to fill in the gap. GEL's mission is to inspire students to become change agents in environmental management in their own lives in both formal and non-formal settings in Malawi. GEL believes that the cultivation of broad-based private and public support is the key to bringing about positive and lasting environmental change hence contributing to water security. The education sector in general and school attendance in particular is largely affected by water security. Furthermore, technological limitations have also affected the accessibility of water resources. UNICEF (2008) asserts that water resources may be scarce as it is capital intensive to sink a bore hole in Malawi. Bwaila secondary school is one of the examples

  17. 78 FR 9768 - Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures...

    Science.gov (United States)

    2013-02-11

    ... DEPARTMENT OF STATE [Public Notice 8184] Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures Against Foreign Persons, Including a Ban on U.S. Government Procurement AGENCY: Bureau of International Security and Nonproliferation, Department of State. ACTION: Notice...

  18. 78 FR 9769 - Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures on...

    Science.gov (United States)

    2013-02-11

    ... DEPARTMENT OF STATE [Public Notice 8182] Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures on Chinese and Iranian Foreign Persons AGENCY: Bureau of International Security and Nonproliferation, Department of State. ACTION: Notice. SUMMARY: The U.S. Government...

  19. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  20. Low-level violence in schools: is there an association between school safety measures and peer victimization?

    Science.gov (United States)

    Blosnich, John; Bossarte, Robert

    2011-02-01

    Low-level violent behavior, particularly school bullying, remains a critical public health issue that has been associated with negative mental and physical health outcomes. School-based prevention programs, while a valuable line of defense to stave off bullying, have shown inconsistent results in terms of decreasing bullying. This study explored whether school safety measures (eg, security guards, cameras, ID badges) were associated with student reports of different forms of peer victimization related to bullying. Data came from the 2007 School Crime Supplement of the National Crime Victimization Survey. Chi-square tests of independence were used to examine differences among categorical variables. Logistic regression models were constructed for the peer victimization outcomes. A count variable was constructed among the bullying outcomes (0-7) with which a Poisson regression model was constructed to analyze school safety measures' impacts on degree of victimization. Of the various school safety measures, only having adults in hallways resulted in a significant reduction in odds of being physically bullied, having property vandalized, or having rumors spread. In terms of degree of victimization, having adults and/or staff supervising hallways was associated with an approximate 26% decrease in students experiencing an additional form of peer victimization. Results indicated that school safety measures overall were not associated with decreased reports of low-level violent behaviors related to bullying. More research is needed to further explore what best promotes comprehensive safety in schools. © 2011, American School Health Association.

  1. An Assessment of Teacher Retention on Job Security in Private Secondary Schools in Ogun State, Nigeria

    Directory of Open Access Journals (Sweden)

    M.F. Faremi

    2017-12-01

    Full Text Available This study assessed the relationship between teacher retention and job security in private secondary schools in Ogun state, Nigeria. The study assessed ade-quacy in teaching and learning infrastructure, evaluated mode of recruitment of teachers, the factors responsible for high teacher turnover and teachers retention strategies employed in private secondary schools. Descriptive research of the survey design was employed in this study. Data were collected using questionnaire. Multistage sampling technique was used for data collection among 200 teachers including the school principals. Data collected were analyzed with a mixture of descriptive and inferential statistics. Percentages, mean and frequency counts were used to answer the research questions raised while Pearson Moment Correlation Coefficient and t-test analysis were used to test the formulated hypotheses at 0.05 level of significance. The findings from this study revealed that teaching and learning infrastructure were inadequate in most of the schools. It was observed that books, classroom and teachers were very adequate in some of the schools. However, few of the schools had internet facility for knowledge transfer and student exposure to the worldwide web. The study also showed that the proprietors were primarily responsible for staff recruitment although there were instances where formal advertisement for recruitment was made. The study further revealed a significant relationship between teacher retention strategies and job security in private secondary schools in Osun state. The study also showed a significant relationship between teacher turnover and job security in the schools. In addition, the findings showed a significant relationship between teacher turnover and job security in private secondary schools in Osun state. Lastly, the study revealed a significant difference in the mean rate and female teachers' turnover in the selected private secondary schools. Based on the

  2. Under Pressure: Job Security, Resource Allocation, and Productivity in Schools under No Child Left Behind

    OpenAIRE

    Randall Reback; Jonah Rockoff; Heather L. Schwartz

    2014-01-01

    We conduct the first nationwide study of incentives under the No Child Left Behind (NCLB) Act, which requires states to punish schools failing to meet target passing rates on students' standardized exams. States' idiosyncratic policies created variation in the risk of failure among very similar schools in different states, which we use to identify effects of accountability pressure. We find NCLB lowers teachers' perceptions of job security, shifts time towards specialist teachers in high-stak...

  3. Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

    Science.gov (United States)

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2018-03-01

    There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience. A questionnaire was given to 125 patients with a THA during a follow-up appointment. Those who had passed through airport security after January 2014 met inclusion criteria. A survey was administered that addressed the number of encounters with airport security, frequency of metal detector activation, additional screening procedures utilised, whether security officials required prosthesis documentation, and perceived inconvenience. 51 patients met inclusion criteria. 10 patients (20%) reported triggered security scanners. 4 of the 10 patients stated they had surgical hardware elsewhere in the body. 13 of the 51 patients (25%) believed that having their THA increased the inconvenience of traveling. This is different from the historical cohort with standard metal detectors which patients reported a greater incidence of alarm triggering (n = 120 of 143; p = 0.0001) and perceived inconvenience (n = 99 of 143; p = 0.0001). The percentage of patients who have THA triggering security alarms has decreased. Furthermore, the number of patients who feel that their prosthesis caused traveling inconvenience has decreased. We feel that this decrease in alarms triggered and improved perceptions about inconvenience are related to the increased usage of new technology.

  4. The Muslim Problematic: Muslims, State Schools and Security

    Science.gov (United States)

    Miah, Shamim

    2016-01-01

    Muslims are folk-devils that mark the ubiquitous moral panic. For some, the idea of the "Muslim problematic" signifies a long and worrying trend of creeping "Islamification" of state schools. For others, the discourse of the "Muslim problematic" reflects the ongoing racial patholigisation of Britain's minoritised…

  5. Delictual Liability of the School Sports Coach - A Security Matter ...

    African Journals Online (AJOL)

    Sports law can be regarded as one of the latest developments in law. As applied to the school setting, and with special reference to sport coaching, this article deals with the five fundamental elements of the law of delict that influence and inform the execution of the duty of care of the educator-coach. This article pays special ...

  6. From Charity to Security: The Emergence of the National School Lunch Program

    Science.gov (United States)

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  7. Religion, Schooling, Community, and Security: Exploring Transitions and Transformations in England

    Science.gov (United States)

    Lundie, David

    2017-01-01

    Education is a complex social practice. In the United Kingdom context, schooling is further nested within the complex social practices of community governance, quasi-market public choice, and religion. This essay explores the shifting definitions of community and education in the context of the Counter Terrorism and Security Act 2015, which places…

  8. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    Science.gov (United States)

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648

  9. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.

    Science.gov (United States)

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung

    2012-06-01

    The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.

  10. Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model

    Directory of Open Access Journals (Sweden)

    Chun-Juan Ouyang

    2017-01-01

    Full Text Available Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.

  11. Basic security measures for IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Oscar P. Sarmiento

    2008-05-01

    Full Text Available This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnera-bilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the unders-tanding of this protocol at academic level. Two practical cases of wireless security configurations using Cisco net-working equipment are also presented: configuring and enabling WPA-Personal and WPA2-Personal (these being security options used by TKIP and AES, respectively.

  12. Basic security measures for IEEE 802.11 wireless networks

    OpenAIRE

    Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David

    2008-01-01

    This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educat...

  13. Measuring Global Water Security Towards Sustainable Development Goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  14. Measuring emotional intelligence of medical school applicants.

    Science.gov (United States)

    Carrothers, R M; Gregory, S W; Gallagher, T J

    2000-05-01

    To discuss the development, pilot testing, and analysis of a 34-item semantic differential instrument for measuring medical school applicants' emotional intelligence (the EI instrument). The authors analyzed data from the admission interviews of 147 1997 applicants to a six-year BS/MD program that is composed of three consortium universities. They compared the applicants' scores on traditional admission criteria (e.g., GPA and traditional interview assessments) with their scores on the EI instrument (which comprised five dimensions of emotional intelligence), breaking the data out by consortium university (each of which has its own educational ethos) and gender. They assessed the EI instrument's reliability and validity for assessing noncognitive personal and interpersonal qualities of medical school applicants. The five dimensions of emotional intelligence (maturity, compassion, morality, sociability, and calm disposition) indicated fair to excellent internal consistency: reliability coefficients were .66 to .95. Emotional intelligence as measured by the instrument was related to both being female and matriculating at the consortium university that has an educational ethos that values the social sciences and humanities. Based on this pilot study, the 34-item EI instrument demonstrates the ability to measure attributes that indicate desirable personal and interpersonal skills in medical school applicants.

  15. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    Energy Technology Data Exchange (ETDEWEB)

    Birch, Gabriel Carisle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Griffin, John Clark [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenarios are presented with calculations showing the application of such a metric.

  16. MEASURING CHILDREN'S FOOD SECURITY IN U.S. HOUSEHOLDS, 1995-99

    OpenAIRE

    Nord, Mark; Bickel, Gary

    2002-01-01

    The capacity to accurately measure the food security status of children in household surveys is an essential tool for monitoring food insecurity and hunger at the most severe levels in U.S. households and for assessing programs designed to prevent or ameliorate these conditions. USDA has developed a children's food security scale to meet this measurement need. The scale is calculated from 8 questions in the 18-item food security survey module that ask specifically about food-related experienc...

  17. Three Perspectives on DSEEP and Security : Training Goals, Use Cases and the Selection of Security Measures

    NARCIS (Netherlands)

    Möller, B.; Croom-Johnson, S.; Huiskamp, W.

    2013-01-01

    As joint, combined and Civil-Military exercises are becoming increasingly common, the need for security in collective mission simulation is growing. SISO has developed the Distributed Simulation Engineering and Execution Process (DSEEP) standard that provides a recommended process for development,

  18. Security Measures in Automated Assessment System for Programming Courses

    Directory of Open Access Journals (Sweden)

    Jana Šťastná

    2015-12-01

    Full Text Available A desirable characteristic of programming code assessment is to provide the learner the most appropriate information regarding the code functionality as well as a chance to improve. This can be hardly achieved in case the number of learners is high (500 or more. In this paper we address the problem of risky code testing and availability of an assessment platform Arena, dealing with potential security risks when providing an automated assessment for a large set of source code. Looking at students’ programs as if they were potentially malicious inspired us to investigate separated execution environments, used by security experts for secure software analysis. The results also show that availability issues of our assessment platform can be conveniently resolved with task queues. A special attention is paid to Docker, a virtual container ensuring no risky code can affect the assessment system security. The assessment platform Arena enables to regularly, effectively and securely assess students' source code in various programming courses. In addition to that it is a motivating factor and helps students to engage in the educational process.

  19. Energy supply security in Europe: principles and measures

    International Nuclear Information System (INIS)

    Keppler, J.H.

    2007-01-01

    After having recalled a dozen of reasons for some worries about energy supply security in Europe during the past months (oil price increase, intentional interruption of gas and oil deliveries by Russia respectively to Ukraine and Belarus, creation of a new CO 2 trading scheme, tensions on the European electricity markets, and so on), the author distinguishes and discusses those which are actually a threat to energy supply and those which are not. Then, he proposes a classification of these threats in relationship with the reasons for delivery interruption, production capacity limitation, or price increase. These reasons can be political situations and decisions, technical problems, commercial reasons. Then, the author examines what European policy makers can do to manage these risks and ensure energy supply security. This needs economic as well as political responses, coherence between domestic energy policies and energy supply security, and an efficient foreign policy based on a multilateral approach

  20. Measuring global water security towards sustainable development goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  1. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (French Edition)

    International Nuclear Information System (INIS)

    2017-01-01

    This publication provides an overview, based on practical experience and lessons learned, for establishing nuclear security systems and measures for major public events. It covers technical and administrative nuclear security measures for developing the necessary organizational structure, developing plans, strategies and concepts of operations, and making arrangements for implementing the developed plans, strategies and concepts.

  2. Enhancing China’s energy security: Determining influential factors and effective strategic measures

    International Nuclear Information System (INIS)

    Ren, Jingzheng; Sovacool, Benjamin K.

    2014-01-01

    Highlights: • The most influential factors affecting China’s energy security are identified. • Fuzzy AHP is used to quantify the importance of influential factors. • Strategic measures for enhancing China’s energy security are prioritized. • Fuzzy AHP is used to determine the priorities of the strategic measures. - Abstract: This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies and improving energy efficiency is the most salient, positive, and necessary strategic measure

  3. Measures to prevent breaches in the security of radioactive materials

    Energy Technology Data Exchange (ETDEWEB)

    Zika-Ahlberg, G [Swedish Board of Customs, Control Division/Control Section, Stockholm (Sweden)

    1998-09-01

    The objective of this paper, which is the result of the co-operation between the Swedish Board of Customs, the Swedish Radiation Protection Institute, the Security Police and the Swedish Nuclear Power Inspectorate, is to give an idea of the national prevention system as to illicit trafficking of nuclear materials and other radioactive sources. (author)

  4. Measures to prevent breaches in the security of radioactive materials

    International Nuclear Information System (INIS)

    Zika-Ahlberg, G.

    1998-01-01

    The objective of this paper, which is the result of the co-operation between the Swedish Board of Customs, the Swedish Radiation Protection Institute, the Security Police and the Swedish Nuclear Power Inspectorate, is to give an idea of the national prevention system as to illicit trafficking of nuclear materials and other radioactive sources. (author)

  5. Improving DNS security : a measurement-based approach

    NARCIS (Netherlands)

    van Rijswijk-Deij, Roland

    2017-01-01

    The Domain Name System (DNS) is a vital part of the core infrastructure of the Internet. It maps human readable names (such as www.example.com) to machine readable information (such as 93.184.216.34). This thesis studies two aspects of the DNS. First, it studies problems in the DNS Security

  6. Security measures effect over performance in service provider network

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Abstract—network security is defined as a set of policies and actions taken by a ... These threats are linked with the following factors that are ... typically smaller than those in the service provider space. ... Service providers cannot manage to provide ... e the DB performance effect ... r the business needs [10].

  7. Measuring global water security towards sustainable development goals

    NARCIS (Netherlands)

    Wada, Y.|info:eu-repo/dai/nl/341387819; Gain, A.K.; Giupponi, C.

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals(SDGs). Many international river basins are likely to experience ‘low water

  8. Whole body measurements in Bavarian school children

    International Nuclear Information System (INIS)

    Schmier, H.; Berg, D.

    1992-12-01

    On behalf of the Bavarian State Ministry for State Development and Environmental Affairs measurements were conducted using the whole body counters at the Institute for Radiation Hygiene (of the Federal Office for Radiation Protection), and the Institute for Radiation Biology (of the GSF Research Centre for Environment and Health). Between September 1988 and July 1990 about 1600 school children from all over Bavaria were investigated for incorporated radiocesium. The aim of these measurements was to evaluate the whole body activity due to regionally differing soil contaminations in Bavaria following the accident in the nuclear power plant in Chernobyl and to assess the effective dose from an intake of radionuclides for the pupils by comparing the results of their WBC measurements with those of reference groups of children which underwent WBC examinations at regular intervals at both institutes since the middle of the year 1986. The results of the WBC measurements of those pupils who had not eaten mushrooms in the days before the measurement are in good agreement with the results of comparative measurements in children living in the regions of Munich and Frankfurt-am-Main. Based on these results an effective dose of 0,2 mSv for the Munich region children and of 0,1 mSv for Nothern Bavarian children can be derived. For children living in the highest contaminated region of Bavaria, i.e. the counties adjacent to the Alps, no comparable reference group results are available, but the amount of incorporated radiocesium is only twice that for pupils in the Munich region. The mean value for the specific activity of radiocesium in South Bavarian school children who consumed mushrooms was found to be twice the value of pupils who did not. This is also true for that group of children whose parents had bought allegedly low contaminated foodstuffs. Other effecs of nutrition habits on the specific whole body activity could not be found. (orig.) [de

  9. Breach Risk Magnitude: A Quantitative Measure of Database Security.

    Science.gov (United States)

    Yasnoff, William A

    2016-01-01

    A quantitative methodology is described that provides objective evaluation of the potential for health record system breaches. It assumes that breach risk increases with the number of potential records that could be exposed, while it decreases when more authentication steps are required for access. The breach risk magnitude (BRM) is the maximum value for any system user of the common logarithm of the number of accessible database records divided by the number of authentication steps needed to achieve such access. For a one million record relational database, the BRM varies from 5.52 to 6 depending on authentication protocols. For an alternative data architecture designed specifically to increase security by separately storing and encrypting each patient record, the BRM ranges from 1.3 to 2.6. While the BRM only provides a limited quantitative assessment of breach risk, it may be useful to objectively evaluate the security implications of alternative database organization approaches.

  10. Measuring the Effectiveness of Border Security Between Ports of Entry

    Science.gov (United States)

    2010-01-01

    ts of migration. Massey, Durand, and Malone (2003) argue that neoclassical theory has limited explanatory power and, in fact, that immigration is...interpreted in the context of dif- ferent theories of how and why immigration occurs. Various theories explain immigration— for example, as a migrant’s...Durand, and Malone, 2003). One theory of how border security aff ects migration is that migrants employ a cost-benefi t calculation when deciding

  11. Systematic, appropriate, and cost-effective application of security technologies in U.S. public schools to reduce crime, violence, and drugs

    Science.gov (United States)

    Green, Mary W.

    1997-01-01

    As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.

  12. Roles for Schools and School Social Workers in Improving Child Food Security

    Science.gov (United States)

    Fram, Maryah Stella; Frongillo, Edward A.; Fishbein, Eliza M.; Burke, Michael P.

    2014-01-01

    Food insecurity is associated with a range of child developmental, behavioral, and emotional challenges, all of which can inhibit a child's school success. Schools offer a number of formal and informal services aimed at reducing food insecurity, but the problems associated with identifying children in need, addressing issues of stigma, and…

  13. Quantifying, Measuring, and Strategizing Energy Security: Determining the Most Meaningful Dimensions and Metrics

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Sovacool, Benjamin

    2014-01-01

    subjective concepts of energy security into more objective criteria, to investigate the cause-effect relationships among these different metrics, and to provide some recommendations for the stakeholders to draft efficacious measures for enhancing energy security. To accomplish this feat, the study utilizes...

  14. Measures for regional security and arms control in the South-East Asian area

    International Nuclear Information System (INIS)

    Uren, R.T.

    1992-01-01

    The subject of regional security and arms control in the South-East Asia raises some new and difficult issues. No approach to ensuring regional security could be complete without military dimension including the following categories: regional arms control; global arms control measure; confidence building measures that are designed to enhance the transparency of defense policies; confidence building measures that encourage cooperation among the military forces in the region

  15. Security Situation in Secondary Schools in Tuzla Canton - BiH

    Directory of Open Access Journals (Sweden)

    Dzevad Mahmutovic

    2011-08-01

    Full Text Available In this research has been presented an assessment of safety situation in schools, examined through the attitudes of students and teachers of secondary schools in five municipalities of Tuzla Canton. The sample consisted of 160 subjects, who for the purposes of this research divided in three subsample: male students, female students and professors. The research was conducted as a questionnaire, where on the posted statements subjects chose one of five responses on the Likert-type scale. The results of the research showed that subjects generally have unfavour­able attitudes about security situation in secondary schools, which makes them feel very insecure. By descriptive analysis, besides these attitudes, it was determined that there are certain differences between the subsamples per individual variables. By analysis of variance, about influence of different status (student-professor on the sub-samples attitudes about safety in schools, it was determined that these differences were not statistically significant at the level p <.05 in results for the three subsample (F = .421, p = .245. In relation on manifested negative att­itudes about safety in schools, but also the homogeneity of results, in relation on the total sample of subjects, it is necessary to determine an adequate strategy of action, develop appropriate programs for work with students and make their prompt implementation in order to achieve safer living conditions and work in the school environment.

  16. A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses

    Directory of Open Access Journals (Sweden)

    Agata McCormac

    2017-11-01

    Full Text Available The Human Aspects of Information Security Questionnaire (HAIS-Q is designed to measure Information Security Awareness. More specifically, the tool measures an individual’s knowledge, attitude, and self-reported behaviour relating to information security in the workplace. This paper reports on the reliability of the HAIS-Q, including test-retest reliability and internal consistency. The paper also assesses the reliability of three preliminary over-claiming items, designed specifically to complement the HAIS-Q, and identify those individuals who provide socially desirable responses. A total of 197 working Australians completed two iterations of the HAIS-Q and the over-claiming items, approximately 4 weeks apart. Results of the analysis showed that the HAIS-Q was externally reliable and internally consistent. Therefore, the HAIS-Q can be used to reliably measure information security awareness. Reliability testing on the preliminary over-claiming items was not as robust and further development is required and recommended. The implications of these findings mean that organisations can confidently use the HAIS-Q to not only measure the current state of employee information security awareness within their organisation, but they can also measure the effectiveness and impacts of training interventions, information security awareness programs and campaigns. The influence of cultural changes and the effect of security incidents can also be assessed.

  17. Developing measures of food and nutrition security within an Australian context.

    Science.gov (United States)

    Archer, Claire; Gallegos, Danielle; McKechnie, Rebecca

    2017-10-01

    To develop a measure of food and nutrition security for use among an Australian population that measures all pillars of food security and to establish its content validity. The study consisted of two phases. Phase 1 involved focus groups with experts working in the area of food security. Data were assessed using content analysis and results informed the development of a draft tool. Phase 2 consisted of a series of three online surveys using the Delphi technique. Findings from each survey were used to establish content validity and progressively modify the tool until consensus was reached for all items. Australia. Phase 1 focus groups involved twenty-five experts working in the field of food security, who were attending the Dietitians Association of Australia National Conference, 2013. Phase 2 included twenty-five experts working in food security, who were recruited via email. Findings from Phase 1 supported the need for an Australian-specific tool and highlighted the failure of current tools to measure across all pillars of food security. Participants encouraged the inclusion of items to measure barriers to food acquisition and the previous single item to enable comparisons with previous data. Phase 2 findings informed the selection and modification of items for inclusion in the final tool. The results led to the development of a draft tool to measure food and nutrition security, and supported its content validity. Further research is needed to validate the tool among the Australian population and to establish inter- and intra-rater reliability.

  18. Cost-effectiveness of Security Measures: A model-based Framework

    DEFF Research Database (Denmark)

    Pieters, Wolter; Probst, Christian W.; Lukszo, Zofia

    2014-01-01

    Recently, cyber security has become an important topic on the agenda of many organisations. It is already widely acknowledged that attacks do happen, and decision makers face the problem of how to respond. As it is almost impossible to secure a complex system completely, it is important to have...... an adequate estimate of the effectiveness of security measures when making investment decisions. Risk concepts are known in principle, but estimating the effectiveness of countermeasure proves to be difficult and cannot be achieved by qualitative approaches only. In this chapter, the authors consider...... the question of how to guarantee cost-effectiveness of security measures. They investigate the possibility of using existing frameworks and tools, the challenges in a security context as opposed to a safety context, and directions for future research....

  19. Household food security status and associated factors among high-school students in Esfahan, Iran.

    Science.gov (United States)

    Mohammadzadeh, Assieh; Dorosty, Ahmadreza; Eshraghian, Mohammadreza

    2010-10-01

    The present study was designed to determine household food security status and factors associated with food insecurity among high-school students in Esfahan, Iran. Cross-sectional surveys. The present study was conducted in autumn 2008 in Esfahan, Iran. The samples were selected using systematic cluster sampling. Socio-economic questionnaires, food security questionnaires and FFQ were filled out during face-to-face interviews. In addition, data on participants' weights and heights were collected. A total of 580 students (261 boys and 319 girls) aged 14-17 years from forty high schools in Esfahan, Iran, were selected. The prevalence of household food insecurity according to the US Department of Agriculture food security questionnaire was 36.6 % (95 % CI 0.33, 0.40). Food insecurity was positively associated with number of members in the household (P hamburger, poultry, fish, green vegetables, root and bulb (coloured) vegetables, melons, apples and oranges, milk and yoghurt (P hamburger), whereas those living in food-insecure households more frequently consumed cheap foods containing high energy per kilogram. The present study suggests that intervention programmes be designed and carried out.

  20. Disarmament and security measures in South-East Asia

    International Nuclear Information System (INIS)

    Hasmy Bin Agam

    1992-01-01

    The situation in South-East Asia is something of a paradox wrought by the end of the cold war and super Power rivalry. As a subregion and integral part of the great Pacific region in cannot be considered in isolation. On the other hand South-East Asia is one of great complexity in terms of its history, peoples and cultures, as well as in its political social and economic systems and orientation. Security picture in South-east Asia in the coming decades depends on a number of impoderables, mainly the situation in Indochina, notably Cambodia, the kind of relationship that will develop between the ASEAN member states and the Indochina countries, as well as with China, as nuclear owning regional Power

  1. Enhancing China’s Energy Security: Determining Influential Factors and Effective Strategic Measures

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Sovacool, Benjamin

    2014-01-01

    This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used...... to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies...

  2. Implementing Network Video for Traditional Security and Innovative Applications: Best Practices and Uses for Network Video in K-12 Schools

    Science.gov (United States)

    Wren, Andrew

    2008-01-01

    Administrators are constantly seeking ways to cost-effectively and adequately increase security and improve efficiency in K-12 schools. While video is not a new tool to schools, the shift from analog to network technology has increased the accessibility and usability in a variety of applications. Properly installed and used, video is a powerful…

  3. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    Full Text Available Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  4. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    Science.gov (United States)

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  5. A Modern Framework for Measuring Poverty and Basic Economic Security

    OpenAIRE

    Shawn Fremstad

    2010-01-01

    This report details how the dominant framework for understanding and measuring poverty in the United States has become a conservative one. The current U.S. approach to measuring poverty views poverty only in terms of having an extremely low level of annual income, and utilizes poverty thresholds that are adjusted only for inflation rather than for changes in overall living standards. As a result, the official poverty measure has effectively defined deprivation down over the last four decades,...

  6. A Review and Analysis of Selected School Climate Measures

    Science.gov (United States)

    Olsen, Jacob; Preston, Angela I.; Algozzine, Bob; Algozzine, Kate; Cusumano, Dale

    2018-01-01

    Although it is widely agreed that there is no universally accepted definition for school climate, most professionals ground it in shared beliefs, values, and attitudes reflecting the quality and character of life in schools. In this article, we review and analyze measures accessible to school personnel charged with documenting and monitoring…

  7. [Are the flight security measures good for the patients? The "sickurity" problem].

    Science.gov (United States)

    Felkai, Péter

    2010-10-10

    Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".

  8. Shootings Revive Debates on Security

    Science.gov (United States)

    Shah, Nirvi

    2013-01-01

    By nearly all accounts, the staff and students at Sandy Hook Elementary School did everything right on Dec. 14--and with the security measures they took before that day--when a young man armed with powerful weapons blasted his way into the school. But the deadliest K-12 school shooting in American history, a day that President Barack Obama has…

  9. Measuring parent perceptions of school climate.

    Science.gov (United States)

    Schueler, Beth E; Capotosto, Lauren; Bahena, Sofía; McIntyre, Joseph; Gehlbach, Hunter

    2014-03-01

    Parents' attitudes about their children's schools matter. Their views can shape their children's attitudes about school, affect their levels of family-school engagement, and influence their residential and school enrollment decisions. In this article, we describe the development of a survey scale to assess parent perceptions of the climate of their child's school. Our comprehensive scale development process incorporated feedback from academics and potential respondents from the outset of the design process to enhance scale quality. We conducted 3 studies with national samples of parents (n = 385; n = 253; n = 266) to gather evidence of scale score reliability and valid score inferences based on convergent and discriminant validity. Through confirmatory factor analysis, we identified a theoretically grounded factor structure that fit the data well but found no evidence that parental response patterns distinguish between academic and social elements of school climate. Furthermore, we found that parents of younger children, on average, had a more positive perception of the school's climate than did parents of older children. We conclude by discussing how researchers and Pre-K-12 schools and districts can use the scale to aid school improvement efforts. 2014 APA

  10. Measuring the Performance of School Superintendent

    Science.gov (United States)

    Ansar

    2015-01-01

    School superintendent has a strategic role in the effort to improve the quality of education, referred to the responsibility to give service and assistance for the teachers and headmasters which will affect the improvement of learning quality in school. Yet, the strategic role and function of superintendent, in fact, is still reflecting its ideal…

  11. Optimal and secure measurement protocols for quantum sensor networks

    Science.gov (United States)

    Eldredge, Zachary; Foss-Feig, Michael; Gross, Jonathan A.; Rolston, S. L.; Gorshkov, Alexey V.

    2018-04-01

    Studies of quantum metrology have shown that the use of many-body entangled states can lead to an enhancement in sensitivity when compared with unentangled states. In this paper, we quantify the metrological advantage of entanglement in a setting where the measured quantity is a linear function of parameters individually coupled to each qubit. We first generalize the Heisenberg limit to the measurement of nonlocal observables in a quantum network, deriving a bound based on the multiparameter quantum Fisher information. We then propose measurement protocols that can make use of Greenberger-Horne-Zeilinger (GHZ) states or spin-squeezed states and show that in the case of GHZ states the protocol is optimal, i.e., it saturates our bound. We also identify nanoscale magnetic resonance imaging as a promising setting for this technology.

  12. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company

    OpenAIRE

    Qureshi, Muhammad Sohail

    2012-01-01

    Nowadays information security policies are operative in many organizations. Currently few organizations take the pain of verifying the efficacy of these policies. Different standards and procedures exist about methods of measuring efficacy of information security policies. Choosing and implementing them depends mainly on the key performance indicators (KPIs) and key risk indicators (KRIs) of any particular organization. This thesis is a case study of an organization in United Arab Emirates (U...

  13. Wide Area Measurement Based Security Assessment & Monitoring of Modern Power System: A Danish Power System Case Study

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Chen, Zhe; Thøgersen, Paul

    2013-01-01

    Power System security has become a major concern across the global power system community. This paper presents wide area measurement system (WAMS) based security assessment and monitoring of modern power system. A new three dimensional security index (TDSI) has been proposed for online security...... monitoring of modern power system with large scale renewable energy penetration. Phasor measurement unit (PMU) based WAMS has been implemented in western Danish Power System to realize online security monitoring and assessment in power system control center. The proposed security monitoring system has been...

  14. FOLLOW-UP RADON MEASUREMENTS IN 14 MITIGATED SCHOOLS

    Science.gov (United States)

    The report gives results of a determination of the long-term performance of radon mitigation systems installed in U. S. EPA research schools: radon measurements were conducted in 14 schools that had been mitigated between 1988 and 1991. The measurements were made between Februar...

  15. The appropriate and effective use of security technologies in U.S. schools : a guide for schools and law enforcement agencies.

    Energy Technology Data Exchange (ETDEWEB)

    Green, Mary Wilson

    2005-06-01

    The purpose of this report is to provide school administrators with the ability to determine their security system requirements, so they can make informed decisions when working with vendors and others to improve their security posture. This is accomplished by (1) explaining a systems-based approach to defining the objectives and needs of the system, and (2), providing information on the ability of common components (sensors, cameras, metal detectors, etc) to achieve those objectives, in an effectively integrated system.

  16. The Tripod School Climate Index: An Invariant Measure of School Safety and Relationships.

    Science.gov (United States)

    Phillips, Sarah Fierberg; Rowley, Jacob F S

    2016-03-01

    Recently revised standards for social work practice in schools encourage data-informed school climate interventions that implicitly require invariant measures of school climate. Invariant measures have the same meaning, scale, and origin across different groups of respondents. Although noninvariant measures bias statistical analyses and can lead users to erroneous conclusions, most school climate measures have not been tested for invariance. This study examines the invariance of the Tripod School Climate Index. Exploratory, confirmatory, and multiple-group confirmatory factor analyses were conducted on data collected from 66,531 students across 222 schools. Results indicate that the index is an excellent fit for the data and invariant by student grade level, demographic background, prior achievement, and dropout risk. Results imply that student responses can be validly aggregated to create school-level scores. The index will not bias studies of school climate interventions or bivariate analyses comparing perceptions of school climate across subgroups of students attending the same school. Given the centrality of school climate interventions to social work practice in schools and the consequences of noninvariance, the development of an index with these properties is an important contribution to the field.

  17. The Profile of a School and Measurement of a Multi-School Organization Change Program.

    Science.gov (United States)

    Feitler, Fred C.

    Modern organization theory and research from business and industry predicts that schools which change toward the Likert participative group organizations will increase productivity. This paper reports interventions of a one-year organization development program carried out with 12 schools and the change results measured by the Profile of a School.…

  18. Development and initial validation of a measure of attachment security in late adulthood.

    Science.gov (United States)

    Lopez, Frederick G; Ramos, Katherine; Kim, Mijin

    2018-05-10

    Attachment theory-guided studies of older adults have generally relied on self-report measures that were validated on young adult samples and that focus on fears of rejection by romantic partners and on experiences of chronic discomfort with romantic intimacy as the key indicators of adult attachment security. These assessment characteristics raise important questions as to whether these measures are appropriate for use with older adults. Unlike their younger adult counterparts, older adults may face distinctive life stage-related threats to their attachment security such as declining health and autonomy, spousal loss, and increased dependence on younger family members for instrumental and emotional support. In response to these concerns, we conducted two independent studies aimed at developing and validating a novel measure of attachment security in older adults-the Late Adulthood Attachment Scale (LAAS). In study one (N = 287), exploratory structural equation modeling (ESEM) methods were used to identify and support a 2-factor structure (Fearful Avoidance, Secure Engagement) underlying LAAS scores. In study two (N = 417), ESEM and regression analyses confirmed the 2-factor structure and demonstrated the ability of LAAS scores to predict participants' well-being over a 3-month interval (n = 93). Findings from both studies support the psychometric adequacy of the LAAS as an alternative measure of attachment security for use with older adult samples. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  19. English Value-Added Measures: Examining the Limitations of School Performance Measurement

    Science.gov (United States)

    Perry, Thomas

    2016-01-01

    Value-added "Progress" measures are to be introduced for all English schools in 2016 as "headline" measures of school performance. This move comes despite research highlighting high levels of instability in value-added measures and concerns about the omission of contextual variables in the planned measure. This article studies…

  20. The School Assessment for Environmental Typology (SAfETy): An Observational Measure of the School Environment.

    Science.gov (United States)

    Bradshaw, Catherine P; Milam, Adam J; Furr-Holden, C Debra M; Johnson, Sarah Lindstrom

    2015-12-01

    School safety is of great concern for prevention researchers, school officials, parents, and students, yet there are a dearth of assessments that have operationalized school safety from an organizational framework using objective tools and measures. Such a tool would be important for deriving unbiased assessments of the school environment, which in turn could be used as an evaluative tool for school violence prevention efforts. The current paper presents a framework for conceptualizing school safety consistent with Crime Prevention through Environmental Design (CPTED) model and social disorganization theory, both of which highlight the importance of context as a driver for adolescents' risk for involvement in substance use and violence. This paper describes the development of a novel observational measure, called the School Assessment for Environmental Typology (SAfETy), which applies CPTED and social disorganizational frameworks to schools to measure eight indicators of school physical and social environment (i.e., disorder, trash, graffiti/vandalism, appearance, illumination, surveillance, ownership, and positive behavioral expectations). Drawing upon data from 58 high schools, we provide preliminary data regarding the validity and reliability of the SAfETy and describe patterns of the school safety indicators. Findings demonstrate the reliability and validity of the SAfETy and are discussed with regard to the prevention of violence in schools.

  1. ORGANIZATION OF ACTIVITIES IN THE COMPUTER LAB AT THE SECONDARY EDUCATIONAL ESTABLISHMENTS IN VIEW OF MEASURES OF INFORMATION SECURITY.

    Directory of Open Access Journals (Sweden)

    V.N. Kovalchuk

    2010-11-01

    Full Text Available The paper the organizational activities of informational security in the secondary school are considered In particular the planning of organizational activities on stages of the lifecycle of the system of information security of educational computer complex is proposed. There are purified the methods of unification for the software installed at the pupils’ workstations. There is developed the tentative calendar plan of regular activities and main approaches to the management of system of informational security of educational computer complex on the basis of hardware-software level and the organization of antivirus security in computer lab is described.

  2. Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask

    Directory of Open Access Journals (Sweden)

    Alex Caro

    2016-04-01

    Full Text Available This article is based on an independent cyber security risk management audit for a public library system completed by the authors in early 2015 and based on a research paper by the same group at Clark University in 2014. We stress that while cyber security must include raising public knowledge in regard to cyber security issues and resources, and libraries are indeed the perfect place to disseminate this knowledge, librarians are also in a unique position as the gatekeepers of information services provided to the public and should conduct internal audits to ensure our content partners and IT vendors take cyber security as seriously as the library and its staff. One way to do this is through periodic reviews of existing vendor relationships. To this end, the authors created a simple grading rubric you can adopt or modify to help take this first step towards securing your library data. It is intended to be used by both technical and non-technical staff as a simple measurement of what vendor agreements currently exist and how they rank, while at the same time providing a roadmap for which security features or policy statements the library can or should require moving forward.

  3. Measuring school climate in high schools: a focus on safety, engagement, and the environment.

    Science.gov (United States)

    Bradshaw, Catherine P; Waasdorp, Tracy E; Debnam, Katrina J; Johnson, Sarah Lindstrom

    2014-09-01

    School climate has been linked to multiple student behavioral, academic, health, and social-emotional outcomes. The US Department of Education (USDOE) developed a 3-factor model of school climate comprised of safety, engagement, and environment. This article examines the factor structure and measurement invariance of the USDOE model. Drawing upon 2 consecutive waves of data from over 25,000 high school students (46% minority), a series of exploratory and confirmatory factor analyses examined the fit of the Maryland Safe and Supportive Schools Climate Survey with the USDOE model. The results indicated adequate model fit with the theorized 3-factor model of school climate, which included 13 subdomains: safety (perceived safety, bullying and aggression, and drug use); engagement (connection to teachers, student connectedness, academic engagement, school connectedness, equity, and parent engagement); environment (rules and consequences, physical comfort, and support, disorder). We also found consistent measurement invariance with regard to student sex, grade level, and ethnicity. School-level interclass correlation coefficients ranged from 0.04 to .10 for the scales. Findings supported the USDOE 3-factor model of school climate and suggest measurement invariance and high internal consistency of the 3 scales and 13 subdomains. These results suggest the 56-item measure may be a potentially efficient, yet comprehensive measure of school climate. © 2014, American School Health Association.

  4. Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

    International Nuclear Information System (INIS)

    McKague, Matthew

    2009-01-01

    Device independent quantum key distribution (QKD) aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used. The previous proof of security by Pironio et al (2009 New J. Phys. 11 045021) applies only to collective attacks where the state is identical and independent and the measurement devices operate identically for each trial in the protocol. We extend this result to a more general class of attacks where the state is arbitrary and the measurement devices have no memory. We accomplish this by a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qubit strategies based on the previous proof by Pironio et al and techniques adapted from Renner.

  5. Challenges of Measuring a Faculty Member Activity in Medical Schools

    OpenAIRE

    Mohammadi, A; Mojtahedzadeh, R; Emami Razavi, S H

    2011-01-01

    Background One of the features of Mission Based Management is measuring the activities of faculty members and departments and their contributions to the school's mission. As it is important to assess the school's readiness for such a system, in this study we assessed the view points of Tehran Medical School's department chairs about faculty members’ activities. Methods We used focus group technique to identify participants' view points. We divided 30 department chairs into homogenous groups o...

  6. Information Systems and Performance Measures in Schools.

    Science.gov (United States)

    Coleman, James S.; Karweit, Nancy L.

    Large school systems bring various administrative problems in handling scheduling, records, and avoiding making red tape casualties of students. The authors review a portion of the current use of computers to handle these problems and examine the range of activities for which computer processing could provide aid. Since automation always brings…

  7. Report of the international forum on nuclear energy, nuclear non-proliferation and nuclear security. Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Yamamura, Tsukasa; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2013-03-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Nuclear Energy, Nuclear Non-proliferation and Nuclear Security - Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia-' on 12 and 13 December 2012, co-hosted by the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo. In the forum, keynote speakers from Japan, International Atomic Energy Agency (IAEA), the U.S., France and Republic of Korea (ROK), respectively explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. In two panel discussions, entitled 'Measures to ensure nuclear non-proliferation and nuclear security of nuclear fuel cycle back end' and 'Measures to ensure nuclear non-proliferation and nuclear security for nuclear energy use in the Asian region and a multilateral cooperative framework', active discussions were made among panelists from Japan, IAEA, the U.S., France, ROK, Russia and Kazakhstan. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report except presentation materials. (author)

  8. Analysis and Measures to Improve Waste Management in Schools

    Directory of Open Access Journals (Sweden)

    Elena Cristina Rada

    2016-08-01

    Full Text Available Assessing waste production in schools highlights the contribution of school children and school staff to the total amount of waste generated in a region, as well as any poor practices of recycling (the so-called separate collection of waste in schools by the students, which could be improved through educational activities. Educating young people regarding the importance of environmental issues is essential, since instilling the right behavior in school children is also beneficial to the behavior of their families. The way waste management was carried out in different schools in Trento (northern Italy was analyzed: a primary school, a secondary school, and three high schools were taken as cases of study. The possible influence of the age of the students and of the various activities carried out within the schools on the different behaviors in separating waste was also evaluated. The results showed that the production of waste did not only depend on the size of the institutes and on the number of occupants, but, especially, on the type of activities carried out in addition to the ordinary classes and on the habits of both pupils and staff. In the light of the results obtained, some corrective measures were proposed to schools, aimed at increasing the awareness of the importance of the right behavior in waste management by students and the application of good practices of recycling.

  9. The strategic measures for the industrial security of small and medium business.

    Science.gov (United States)

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  10. The Strategic Measures for the Industrial Security of Small and Medium Business

    Directory of Open Access Journals (Sweden)

    Chang-Moo Lee

    2014-01-01

    Full Text Available The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business, furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  11. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide

    International Nuclear Information System (INIS)

    2012-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  12. Nuclear Security Systems and Measures for Major Public Events. Implementing Guide (Russian Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    Terrorism remains a threat to international stability and security. High profile international and national major public events occur regularly, capturing great public interest and receiving intense media coverage. It is widely acknowledged that there is a substantial threat of a terrorist attack on major public events such as high profile political or economic summit meetings or major sporting contests. The threat of nuclear and radiological terrorism remains on the international security agenda. Nevertheless, to reduce this risk, the international community has made great progress in securing nuclear and other radioactive material that could otherwise be used in a terrorist act. This progress is contingent on the efforts of all States to adopt strong nuclear security systems and measures. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The hazards of this material vary according to composition and intensity. Additionally, the use of explosives in combination with this material can drastically enhance the impact of a criminal or terrorist act. If a criminal or terrorist group managed to detonate a so-called 'dirty' bomb in an urban area, the result could be mass panic, widespread radioactive contamination and major economic and social disruption. Major public events are seldom held in the same State or at the same location or even at the same venue. At the national level, the hosting of major public events with proper nuclear security arrangements can provide a foundation on which to build an enduring national framework for nuclear security; one that can exist long after the event. The organization of a major public event in which large numbers of people congregate presents complex security challenges for the State hosting such an event. Criminal or terrorist acts involving nuclear or other radioactive material at any major public event could result in

  13. Bureaucratic Structure in Schools: A Refinement and Synthesis in Measurement.

    Science.gov (United States)

    Sousa, David A.; Hoy, Wayne K.

    1981-01-01

    Compares two methods of measuring bureaucratic structure, Hall's organizational inventory and the University of Aston (England) approach, and tests them using data from 55 public high schools in New Jersey. Factor analysis reveals four underlying dimensions of school structure, including organizational control, rational specialization, system…

  14. Measuring the security of external energy supply in the European Union

    DEFF Research Database (Denmark)

    Le Coq, Chloe; Paltseva, Elena

    2009-01-01

    The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political...

  15. Policies and measures for economic efficiency, energy security and environment protection in India

    International Nuclear Information System (INIS)

    Venkaiah, M.; Kaushik, S.C.; Dewangan, M.L.

    2007-01-01

    India needs to sustain 8-10% economic growth to meet energy needs of people below poverty line. India would, at least, need to grow its primary energy supply (3-4 times) of present consumption to deliver a sustained growth of 8% by 2031. This paper discusses India's policies and measures for economic efficiency, environment protection and energy security (3-E). (author)

  16. 76 FR 30986 - Bureau of International Security and Nonproliferation; Imposition of Nonproliferation Measures...

    Science.gov (United States)

    2011-05-27

    ... DEPARTMENT OF STATE [Public Notice 7485] Bureau of International Security and Nonproliferation; Imposition of Nonproliferation Measures Against Foreign Persons, Including a Ban on U.S. Government... of foreign entities and one foreign person have engaged in activities that warrant the imposition of...

  17. Door locking and exit security measures on acute psychiatric admission wards

    NARCIS (Netherlands)

    Nijman, H.L.I.; Bowers, L.; Haglund, K.; Muir-Cochrane, E.; Simpson, A.; Merwe, M. van der

    2011-01-01

    Locking the exit doors of psychiatric wards is believed to reduce the risk of patients absconding. The aims of the study were to investigate both the prevalence of door locking and other exit security measures on UK admission wards, as well as whether door locking appears to be effective in keeping

  18. Scripting Quality of Security Service (QoSS) Safeguard Measures for the Suggested INFOCON System

    National Research Council Canada - National Science Library

    Guild, Jennifer

    2004-01-01

    .... The focus will be on the security of the DOD information infrastructure and the accomplishment of the mission, as well as the usability and the standardization of the INFOCON warning system. The end result is a prototype that is a set of predefined escalation scripts for the evolved INFOCON system's safeguard measures.

  19. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  20. Measuring social networks in British primary schools through scientific engagement

    Science.gov (United States)

    Conlan, A. J. K.; Eames, K. T. D.; Gage, J. A.; von Kirchbach, J. C.; Ross, J. V.; Saenz, R. A.; Gog, J. R.

    2011-01-01

    Primary schools constitute a key risk group for the transmission of infectious diseases, concentrating great numbers of immunologically naive individuals at high densities. Despite this, very little is known about the social patterns of mixing within a school, which are likely to contribute to disease transmission. In this study, we present a novel approach where scientific engagement was used as a tool to access school populations and measure social networks between young (4–11 years) children. By embedding our research project within enrichment activities to older secondary school (13–15) children, we could exploit the existing links between schools to achieve a high response rate for our study population (around 90% in most schools). Social contacts of primary school children were measured through self-reporting based on a questionnaire design, and analysed using the techniques of social network analysis. We find evidence of marked social structure and gender assortativity within and between classrooms in the same school. These patterns have been previously reported in smaller studies, but to our knowledge no study has attempted to exhaustively sample entire school populations. Our innovative approach facilitates access to a vitally important (but difficult to sample) epidemiological sub-group. It provides a model whereby scientific communication can be used to enhance, rather than merely complement, the outcomes of research. PMID:21047859

  1. Data Security Measures in the IT Service Industry: A Balance between Knowledge & Action

    Directory of Open Access Journals (Sweden)

    N. Mlitwa

    2008-12-01

    Full Text Available That knowledge is power is fast becoming a cliche within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www, it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even theft of confidential information, leading to financial losses in information dependant competitive institutions is therefore high. Improving efficiencies through ICT therefore, comes with security responsibilities. The problem however is that most organizations tend to focus on task-enhancing efficiencies and neglect security. Possibly due to limited awareness about security, underestimating the problem, concerns about security costs, or through plain negligence. The activity theory of Engestrm and the activity analysis development framework of Mursu et al are used as analytical lenses to the cybercrime challenge in this paper. A practical case study of Company X, an IT service provider in Malawi is then used to understand the extent to which organisations that offer electronic data solutions prioritise security in their operations. It is found that even better informed organisations fall short in taking adequate data security measures. A recommendation for all organisations is that they should not only have a clear policy, but also ensure that it is routinely and consistently implemented throughout the operations if information capital is to be secured. A framework towards a holistic approach to thinking about, and in addressing cybercrime is suggested, and recommended in the paper.

  2. A Secure Base from Which to Regulate: Attachment Security in Toddlerhood as a Predictor of Executive Functioning at School Entry

    Science.gov (United States)

    Bernier, Annie; Beauchamp, Miriam H.; Carlson, Stephanie M.; Lalonde, Gabrielle

    2015-01-01

    In light of emerging evidence suggesting that the affective quality of parent-child relationships may relate to individual differences in young children's executive functioning (EF) skills, the aim of this study was to investigate the prospective associations between attachment security in toddlerhood and children's EF skills in kindergarten.…

  3. Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports

    Science.gov (United States)

    2013-03-01

    general management, public administration, and performance measurement principles. The main objective is to discover patterns or trends in the writings ...security programs. Some of the writing is critical of administrative policy before and after 9/11, and takes exception to an apparent lack of unity...measurement tools. The diverse group should not be turned loose to freelance ; but should be held accountable with formal direction, based on stakeholder

  4. Performance Measurement using KPKU- BUMN in X School Education Foundation

    Science.gov (United States)

    Arijanto, Sugih; Harsono, Ambar; Taroepratjeka, Harsono

    2016-01-01

    The purpose of this research is to determine X School's Strengths and Opportunity of Improvement through performance measurement using KPKU-BUMN (Kriteria Penilaian Kinerja Unggul - Kementerian Badan Usaha Milik Negara). KPKU-BUMN is developed based on Malcolm Baldrige Criteria for Performance Excellent (MBCfPE). X school is an education foundation at Bandung that has provides education from kindergarten, elementary school, to junior and senior high school. The measurement is implemented by two aspects, Process and Result. The Process is measured by A-D-L-I approaches (Approach- Deployment-Learning- Integration), on the other hand The Result is measured by Le-T-C-I approach (Level-Trend- Comparison-Integration). There are six processes that will be measured: (1) Leadership, (2) Strategic Planning, (3) Customer Focus, (4) Measurement, Analysis and Knowledge Management, (5) Work Force Focus, and (6) Operation Focus. Meanwhile, the result are (a) product & process outcomes, (b) customer-focused outcomes, (c) workforce-focused outcomes, (d) leadership & governance outcomes, and (e) financial & market outcomes. The overall score for X School is 284/1000, which means X School is at “early result” level at “poor” global image.

  5. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  6. Measuring School Climate in High Schools: A Focus on Safety, Engagement, and the Environment

    Science.gov (United States)

    Bradshaw, Catherine P.; Waasdorp, Tracy E.; Debnam, Katrina J.; Johnson, Sarah Lindstrom

    2014-01-01

    Background: School climate has been linked to multiple student behavioral, academic, health, and social-emotional outcomes. The US Department of Education (USDOE) developed a 3-factor model of school climate comprised of safety, engagement, and environment. This article examines the factor structure and measurement invariance of the USDOE model.…

  7. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  8. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  9. Security in an interdependent world. Medford, Massachusetts, 18 May 2003. Statement to the Fletcher School at Tufts University

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    Addressing the members of The Fletcher School Board of Overseers, Director General of the IAEA emphasised the principal actions that will be essential achieve security in an independent world: First, we must modernize and revamp the collective security system of the United Nations Charter - in terms of both preventive diplomacy and enforcement action. To start, the Security Council should be reconstituted to include the major political and economic powers of today's world. In addition, new working concepts, tools and methods are needed to ensure that the Council can effectively discharge its role as the body with 'the primary responsibility' for the maintenance of international peace and security. Second, we must create an environment in which, as foreseen in the UN Charter, the use of force is limited to situations of self-defence or enforcement measures authorized by the Security Council. Preemptive strikes, however tempting, can send the global community into uncharted and dangerous territory. Only an action authorized by the Council will bring international legitimacy and support to such a measure. More importantly, these limitations will restrict the use of force to those situations where force is indeed the last and only alternative. Third, we must take concrete steps to de-legitimize the acquisition or use of weapons of mass destruction. Clearly, a new approach is needed - an approach that applies to all weapons of mass destruction, and would include: universal adherence to conventions that ban such weapons; robust and intrusive systems of verification for all related weapons conventions; a clear road map and the determination to eliminate these weapons in all States, to abolish over time the divide between the nuclear 'haves' and 'have nots'; new doctrines of security that do not rely on the deterrent effect of nuclear weapons; and reliable enforcement measures, under the aegis of the Security Council, to effectively counter efforts by any country to

  10. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  11. A brief measure of adolescent perceptions of school climate.

    Science.gov (United States)

    White, Nick; La Salle, Tamika; Ashby, Jeffrey S; Meyers, Joel

    2014-09-01

    Student perceptions of school climate represent the ways students feel about the school environment. These include perceptions regarding safety, teaching and learning, and relationships within the school. It has been found that student perceptions of school climate are positively correlated with academic achievement (Brookover et al., 1978), and negatively correlated with risky behaviors (Bandyopadhyay, Cornell, & Konold, 2009; Bayar & Ucanok, 2012; Wang, Berry, & Swearer, 2013). The Georgia Brief School Climate Inventory (GaBSCI) is a measure of student perceptions of school climate. The brevity of the 9-item instrument makes it ideal as a general measure that can be used to monitor student perceptions of school climate. The survey was anonymously administered to 130,968 sixth- and eighth-grade students in the state of Georgia. Cronbach's alpha for the scale was 0.71. Exploratory and confirmatory factor analyses verified the scale's structure. Student perceptions of climate from the GaBSCI varied based on race/ethnicity, gender, and grade. Additional support for the construct validity of the GaBSCI was obtained based on its relationships with several behaviors related to bullying, and the moderating effects of grade and gender on these relationships. Implications for research and practice are discussed. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  12. Bio-security measures employed by poultry farmers in Enugu State ...

    African Journals Online (AJOL)

    Major bio-security measures used by farmers include: inspection of flock daily to pick mortalities (x̄ =3.7), isolation and quarantine of sick birds (x̄ =3.7), vaccination of birds (x̄ =3.6), as well as adequate cleaning of feeding and drinking troughs (x̄ =3.6). The standardized coefficients for age (0.327), farming experience ...

  13. Comprehensive legal aid to the participants in criminal proceedings when applying security measures

    Directory of Open Access Journals (Sweden)

    Fadeev P.V.

    2014-12-01

    Full Text Available Legal assistance to the participants in criminal procedure is represented as a complex phenomenon, including the features of international legal assistance, qualified legal assistance, as well as the activities of public authorities in criminal proceedings and professional lawyers (attorneys, advocates, representatives to assist physical and legal persons to protect, safeguard and realize their rights and interests. Legal assistance in case of threat to life, health, rights of participants in criminal proceedings is considered. The activity of certain subjects of criminal proceedings aimed at explaining the rights of crime victims is analyzed. The grounds for applying security measures are determined. Proposals for improving part 3 of article 11 of the RF Criminal Procedure Code are made: “3. In case there is a threat of causing physical, property, moral damage or other harm prohibited by criminal law to rights and legitimate interests of the victim, witness or other participants in criminal proceedings as well as their close relatives, relatives or close persons, the court (judge, the prosecutor, the head of the investigative agency, the investigator, the preliminary investigation agency take security measures, provided by part 9 of article 166, part 2 of article 186, part 8 of article 193, paragraph 4 of part 2 of article 241 and part 5 of article 278 of this Code as well as other security measures provided by the RF legislation, in respect of those persons within twenty-four hours on the basis of these persons’ written (oral statement or on their own initiative within their competence”.

  14. Measuring environmental attitudes of elementary school students

    Science.gov (United States)

    John C. Benjamin; George H. Moeller; Douglas A. Morrison

    1977-01-01

    A modified semantic differential was developed to measure environmental attitudes of sixth-graders. Classes were selected to represent different socioeconomic and residence backgrounds and degrees of previous exposure to structured environmental programs. Results indicate that: exposure to environmental education fosters favorable environmental attitudes; socioeconomic...

  15. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  16. A game theoretic framework for evaluation of the impacts of hackers diversity on security measures

    International Nuclear Information System (INIS)

    Zare Moayedi, Behzad; Azgomi, Mohammad Abdollahi

    2012-01-01

    Game theoretical methods offer new insights into quantitative evaluation of dependability and security. Currently, there is a wide range of useful game theoretic approaches to model the behaviour of intelligent agents. However, it is necessary to revise these approaches if there is a community of hackers with significant diversity in their behaviours. In this paper, we introduce a novel approach to extend the basic ideas of applying game theory in stochastic modelling. The proposed method classifies the community of hackers based on two main criteria used widely in hacker classifications, which are motivation and skill. We use Markov chains to model the system and compute the transition rates between the states based on the preferences and the skill distributions of hacker classes. The resulting Markov chains can be solved to obtain the desired security measures. We also present the results of an illustrative example using the proposed approach, which examines the relation between the attributes of the community of hackers and the security measures.

  17. Molecules for security measures: from keypad locks to advanced communication protocols.

    Science.gov (United States)

    Andréasson, J; Pischel, U

    2018-04-03

    The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.

  18. Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture

    Science.gov (United States)

    Jurčević, M.; Hegeduš, H.; Golub, M.

    2010-01-01

    Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.

  19. Conceptual proposals for measuring the impact of international regimes on energy security

    International Nuclear Information System (INIS)

    Sander, Michael

    2013-01-01

    The paper proposes two concepts to assess the effect of international regimes on energy security. Existing indicators focus mainly on state-level factors, excluding international influences. International relation scholars on the other hand see a clear connection between international regimes and stable energy relations. International regimes stabilise energy relations by providing frameworks for negotiations, defining, controlling and sanctioning compliance and allowing the actors to engage in package deals. The researcher needs to include these factors in a complete assessment of political energy security risks. As first step, the paper uses the effectiveness of control mechanisms as basis for such consideration. It refers specifically to international arbitration as the most important control mechanism in international energy relations. The simplest measurement option is the share of a county's energy imports covered by a certain regime. The paper applies the Oslo-Potsdam-Solution to account for outcome effectiveness. It applies a variant of the International Regimes Data Base protocol to account for effective regime structures. In a last section, the paper proposes some possible paths for future research. - Highlights: • International regimes mitigate political risks for energy supply and must be considered. • The paper proposes two concepts to measure energy regime effectiveness. • The OPS-variant measures output, the IRDB-variant measures structure effectiveness. • The paper offers a preliminary feasibility test for the concepts. • Finally, it suggests further roads for research

  20. Measurement of Ethnic Background in Cross-national School Surveys

    DEFF Research Database (Denmark)

    Jensen, Helene Nordahl; Krølner, Rikke; Páll, Gabrilla

    2011-01-01

    Indicators such as country of birth and language spoken at home have been used as proxy measures for ethnic background, but the validity of these indicators in surveys among school children remains unclear. This study aimed at comparing item response and student-parent agreement on four questions...

  1. Kinematic Measures of Imitation Fidelity in Primary School Children

    Science.gov (United States)

    Williams, Justin H. G.; Casey, Jackie M.; Braadbaart, Lieke; Culmer, Peter R.; Mon-Williams, Mark

    2014-01-01

    We sought to develop a method for measuring imitation accuracy objectively in primary school children. Children imitated a model drawing shapes on the same computer-tablet interface they saw used in video clips, allowing kinematics of model and observers' actions to be directly compared. Imitation accuracy was reported as a correlation reflecting…

  2. Analysis of High School German Textbooks through Rasch Measurement Model

    Science.gov (United States)

    Batdi, Veli; Elaldi, Senel

    2016-01-01

    The purpose of the present study is to analyze German teacher trainers' views on high school German textbooks through the Rasch measurement model. A survey research design was employed and study group consisted of a total of 21 teacher trainers, three from each region and selected randomly from provinces which are located in seven regions and…

  3. Measuring ICT Use and Contributing Conditions in Primary Schools

    Science.gov (United States)

    Vanderlinde, Ruben; Aesaert, Koen; van Braak, Johan

    2015-01-01

    Information and communication technology (ICT) use became of major importance for primary schools across the world as ICT has the potential to foster teaching and learning processes. ICT use is therefore a central measurement concept (dependent variable) in many ICT integration studies. This data paper presents two datasets (2008 and 2011) that…

  4. Nuclear security measures at the XV Pan American Games: Rio de Janeiro 2007

    International Nuclear Information System (INIS)

    2009-03-01

    The objective of this report is to describe the nuclear security arrangements established and implemented for the Rio 2007 Games. (Nuclear security is taken to mean the prevention, detection and interdiction of malicious acts involving nuclear or other radioactive material and the response to such acts should they occur.) These arrangements may serve as an example of the arrangements that need to be made for Member States hosting major public events in the future. The information is intended for use by national authorities such as counter terrorism agencies, national radiation measurement and assessment institutions, bomb squad, police and other relevant law enforcement agencies. Section 1 comprises an introduction about the report's background, objective, scope and structure. Section 2 provides a description of the arrangements made during the preparatory phase: the overall security concept; the evaluation of the threat; the policy decisions taken; the organizational arrangements; the nuclear security plan; and the cooperation with the IAEA. Section 3 describes the concept of operations: the strategy for choosing the targets to be protected; the different lines of defence; the coordination and management of activities; and the actions to be taken to prevent, detect, interdict and respond to malicious acts and other unauthorized acts involving nuclear or other radioactive material. Section 4 covers the logistics including the radiation detection instruments used, their deployment, testing and maintenance and training in their use. Section 5 presents the results of the surveys undertaken prior to the Rio 2007 Games and of the access controls of the venues during the Rio 2007 Games. Section 6 provides the conclusions that may be drawn from the work undertaken. Section 7 gives recommendations to other national authorities facing similar challenge in the future

  5. The association of family food security and depression in mothers having primary school children in Ray-Iran.

    Science.gov (United States)

    Payab, Moloud; Motlagh, Ahmad-Reza Dorosty; Eshraghian, Mohammadreza; Rostami, Reza; Siassi, Fereydoun

    2014-01-01

    As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group.

  6. Factor structure of the Essen Climate Evaluation Schema measure of social climate in a UK medium-security setting.

    Science.gov (United States)

    Milsom, Sophia A; Freestone, Mark; Duller, Rachel; Bouman, Marisa; Taylor, Celia

    2014-04-01

    Social climate has an influence on a number of treatment-related factors, including service users' behaviour, staff morale and treatment outcomes. Reliable assessment of social climate is, therefore, beneficial within forensic mental health settings. The Essen Climate Evaluation Schema (EssenCES) has been validated in forensic mental health services in the UK and Germany. Preliminary normative data have been produced for UK high-security national health services and German medium-security and high-security services. We aim to validate the use of the EssenCES scale (English version) and provide preliminary normative data in UK medium-security hospital settings. The EssenCES scale was completed in a medium-security mental health service as part of a service-wide audit. A total of 89 patients and 112 staff completed the EssenCES. The three-factor structure of the EssenCES and its internal construct validity were maintained within the sample. Scores from this medium-security hospital sample were significantly higher than those from earlier high-security hospital data, with three exceptions--'patient cohesion' according to the patients and 'therapeutic hold' according to staff and patients. Our data support the use of the EssenCES scale as a valid measure for assessing social climate within medium-security hospital settings. Significant differences between the means of high-security and medium-security service samples imply that degree of security is a relevant factor affecting the ward climate and that in monitoring quality of secure services, it is likely to be important to apply different scores to reflect standards. Copyright © 2013 John Wiley & Sons, Ltd.

  7. Social Security Measures for Elderly Population in Delhi, India: Awareness, Utilization and Barriers.

    Science.gov (United States)

    Kohli, Charu; Gupta, Kalika; Banerjee, Bratati; Ingle, Gopal Krishna

    2017-05-01

    World population of elderly is increasing at a fast pace. The number of elderly in India has increased by 54.77% in the last 15 years. A number of social security measures have been taken by Indian government. To assess awareness, utilization and barriers faced while utilizing social security schemes by elderly in a secondary care hospital situated in a rural area in Delhi, India. A cross-sectional study was conducted among 360 individuals aged 60 years and above in a secondary care hospital situated in a rural area in Delhi. A pre-tested, semi-structured schedule prepared in local language was used. Data was analysed using SPSS software (version 17.0). Chi-square test was used to observe any statistical association between categorical variables. The results were considered statistically significant if p-value was less than 0.05. A majority of study subjects were females (54.2%), Hindu (89.7%), married (60.3%) and were not engaged in any occupation (82.8%). Awareness about Indira Gandhi National Old Age Pension Scheme (IGNOAPS) was present among 286 (79.4%) and Annapurna scheme in 193 (53.6%) subjects. Among 223 subjects who were below poverty line, 179 (80.3%) were aware of IGNOAPS; while, 112 (50.2%) were utilizing the scheme. There was no association of awareness with education status, occupation, religion, family type, marital status and caste (p>0.05). Corruption and tedious administrative formalities were major barriers reported. Awareness generation, provision of information on how to approach the concerned authority for utilizing the scheme and ease of administrative procedures should be an integral part of any social security scheme or measure. In the present study, about 79.4% of elderly were aware and 45% of the eligible subjects were utilizing pension scheme. Major barriers reported in utilization of schemes were corruption and tedious administrative procedures.

  8. Methodology for measurement in schools and kindergartens: experiences

    International Nuclear Information System (INIS)

    Fotjikova, I.; Navratilova Rovenska, K.

    2015-01-01

    In more than 1500 schools and preschool facilities, long-term radon measurement was carried out in the last 3 y. The negative effect of thermal retrofitting on the resulting long-term radon averages is evident. In some of the facilities, low ventilation rates and correspondingly high radon levels were found, so it was recommended to change ventilation habits. However, some of the facilities had high radon levels due to its ingress from soil gas. Technical measures should be undertaken to reduce radon exposure in this case. The paper presents the long-term experiences with the two-stage measurement methodology for investigation of radon levels in school and preschool facilities and its possible improvements. (authors)

  9. Illicit drug consumption in school populations measured by wastewater analysis.

    Science.gov (United States)

    Zuccato, Ettore; Gracia-Lor, Emma; Rousis, Nikolaos I; Parabiaghi, Alberto; Senta, Ivan; Riva, Francesco; Castiglioni, Sara

    2017-09-01

    Analysis of student consumption of illicit drugs (ID) by school population surveys (SPS) provides information useful for prevention, but the results may be influenced by subjective factors. We explored wastewater (WW) analysis to improve the information. We used WW analysis to measure ID consumption in eight secondary schools in Italy in 2010-13 (students aged 15-19). Samples were collected from the sewage pipes of the schools during lessons for one week each year. Samples were analysed by mass spectrometry to measure ID and consumption by students was compared to that of the general population. We found THCCOOH (human metabolite of THC) concentrations in 2010 indicating significant consumption of cannabis in all the schools and benzoylecgonine (human metabolite of cocaine) suggesting a limited consumption of cocaine in all but one school. Morphine was only found in traces, and amphetamine, methamphetamine, ecstasy, ketamine and mephedrone were not detectable. Repeated analysis showed cannabis stable until 2012 with increases in 2013, low cocaine and morphine levels, and none of the other ID. WW analysis suggested that students used amounts of cannabis comparable to the general population, with low, sporadic use of cocaine and opioids, but excluded the use of significant amounts of amphetamine, methamphetamine, ecstasy, ketamine and mephedrone. WW analysis was useful to confirm SPS figures and provides complementary findings for effective prevention strategies. This is the first time WW analysis has been used to investigate consumption of a large number of ID and new psychoactive substances (NPS) in schools. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. Flexicurity as a measuring leakage protection of workers: between "social pollution" and "total security".

    Directory of Open Access Journals (Sweden)

    Calogero Massimo Cammalleri

    2012-01-01

    Full Text Available Was not the labour problem the same everywhere? The paper at­tempts to answer this question by proposing a re-interpretation of flexicurity through the comparison with the economic concepts of externalities and distortion of competition. After a methodological and epistemological premise, based on a multidisciplinary literature, the paper - crit­ically addresses the origins of flexicurity and argues that it lacks an archetypical definition, especially in the formulation of the EU Commission. Hence, the paper considers flexicurity as any balance between flexibility and security and, therefore, pro­poses ordering any set of contracts, providing the same balance and with the same regulatory framework, in “communities”. It is assumed, therefore, that communities can differ either in terms of a “protective” trade­-off, where the differential is not a surrogate measure of security, or in terms of an economic trade-off, where it is met by the provision of social insurance or security. One of these sets is called community 0 and it corresponds to undeclared work, not only illegal, but also completely devoid of security and fully flexible. After identifying from ILO, EU and constitutional sources the foundation of the “incompressibility” of rights which guarantee decent work, the paper likens decent work to a public good of general interest, in the same way as laws generally recognize the natural environment. On the basis of this comparative axiom, the paper proposes considering the dispersion of security produced by undeclared work as “un-decent” work and, therefore, as a form of “pollution”. The paper proposes, conversely, to define as a “total secure” environment one where there is no loss of se­curity and, therefore, a non-polluted environment. Because an environment can be little or very polluted, the paper proposes considering as social pollution any form, even legal, of security leakage - such as that induced by the

  11. Present state and problems of the measures for securing stable supply of uranium resources

    International Nuclear Information System (INIS)

    Yoneda, Fumishige

    1982-01-01

    The long-term stable supply of uranium resources must be secured in order to accelerate the development and utilization of nuclear power in Japan. All uranium required in Japan is imported from foreign countries, and depends on small number of suppliers. On the use of uranium, various restrictions have been imposed by bilateral agreements from the viewpoint of nuclear non-proliferation policy. At present, the demand-supply relation in uranium market is not stringent, but in the latter half of 1980s, it is feared that it will be stringent. The prospect of the demand and supply of uranium resources, the state of securing uranium resources, the present policy on uranium resources, the necessity of establishing the new policy, and the active promotion of uranium resource measures are described. The measures to be taken are the promotion of exploration and development of mines, the participation in the management of such foreign projects, the promotion of diversifying the supply sources, the establishment of the structure to accept uranium resources, the promotion of the storage of uranium, and the rearrangement of general coordination and promotion functions for uranium resource procurement. (Kako, I.)

  12. Risk Informed Approach for Nuclear Security Measures for Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to States for developing a risk informed approach and for conducting threat and risk assessments as the basis for the design and implementation of sustainable nuclear security systems and measures for prevention of, detection of, and response to criminal and intentional unauthorised acts involving nuclear and other radioactive material out of regulatory control. It describes concepts and methodologies for a risk informed approach, including identification and assessment of threats, targets, and potential consequences; threat and risk assessment methodologies, and the use of risk informed approaches as the basis for informing the development and implementation of nuclear security systems and measures. The publication is an Implementing Guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, law enforcement agencies and experts from competent authorities and other relevant organizations involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures related to nuclear and other radioactive material out of regulatory control

  13. Measuring energy security: Trends in the diversification of oil and natural gas supplies

    International Nuclear Information System (INIS)

    Cohen, Gail; Joutz, Frederick; Loungani, Prakash

    2011-01-01

    We present evidence on one facet of energy security in OECD economies-the extent of diversification in sources of oil and natural gas supplies. Viewed from the perspective of the energy-importing countries as a whole, there has not been much change in diversification in oil supplies over the last decade, but diversification in sources of natural gas supplies has increased steadily. We document the considerable cross-country heterogeneity in the extent of diversification. We also show how the extent of diversification changes if account is taken of the political risk attached to suppliers; the size of the importing country; and transportation risk. - Highlights: → Global diversification is constant but large differences exist among countries. → Political risk and distance have large impacts on diversity measures. → Size has little impact on diversity measures. → France, US, and UK show low vulnerability for both fuels. → Smaller European countries show high vulnerability for both fuels.

  14. A short overview of measures for securing water resources for irrigated crop production

    DEFF Research Database (Denmark)

    Jensen, Christian Richardt; Ørum, Jens Erik; Pedersen, Søren Marcus

    2014-01-01

    Agriculture is the main user of limited fresh water resources in the world. Optimisation of agricultural water resources and their use can be obtained by both agronomical and political incentives. Important options are: reduction of the loss of irrigation water in conveyance before it reaches...... of the 'virtual water' principles so that water-rich regions secure food supply to dry regions; reduction in waste of food, feed and biofuel from post-harvest to the end consumer; changing of food composition to less water-consuming products; regulating amount of irrigation water by rationing, subsidies or water...... pricing to support water-saving measures such as use of drip, irrigation scheduling and DI. The potential for water saving for different measures is discussed and estimated. Reduction in waste of food and loss of irrigation water from conveyance source to farm both has a great potential for water saving...

  15. Field measurements and guidelines for the application of wireless sensor networks to the environment and security.

    Science.gov (United States)

    Gil Jiménez, Víctor P; Armada, Ana García

    2009-01-01

    Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow(©). Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems.

  16. Statistics & Input-Output Measures for School Libraries in Colorado, 2002.

    Science.gov (United States)

    Colorado State Library, Denver.

    This document presents statistics and input-output measures for K-12 school libraries in Colorado for 2002. Data are presented by type and size of school, i.e., high schools (six categories ranging from 2,000 and over to under 300), junior high/middle schools (five categories ranging from 1,000-1,999 to under 300), elementary schools (four…

  17. Analysis of satisfaction factors at urban transport interchanges: Measuring travelers’ attitudes to information, security and waiting

    Energy Technology Data Exchange (ETDEWEB)

    Lois Garcia, D.; Monzon de Caceres, A.; Hernandez del Olmo, S.

    2016-07-01

    Transport interchanges can be considered as a node, where people transfer from one mode to another, and as a place to stay, using facilities and services as well as waiting areas. Reducing disruption of transfer in multimodal trips is a key element for assuring seamless mobility in big cities. Based on previous research (Hernández & Monzón, 2016) this paper aims to explore the predictive capacity of attitudes towards several service factors on general satisfaction with transport interchange. Complementary, it was analyzing how personal and trip characteristics are related to evaluation of some variables, and examining the influence of waiting time on the perceived quality. To that end, a two steps methodology was conducted (personal and on-line interview) in a representative sample of 740 users (54% female, 55% work purpose trip). We performed path analysis to test the model showing a satisfactory statistical fit. The model developed show good performance for predicting general satisfaction at Moncloa Transport Interchange (Madrid, Spain). The outputs of the model indicate that Information and Safety and Security factors predicted 49% of general satisfaction. Furthermore, the results showed also a strong association between evaluation of Design and Environmental quality, factors that not affect directly general satisfaction but do so through Information and Safety & Security perception, acting the last as mediator variables. Nevertheless, spending time queuing inside the interchange show a negative influence on Information and Safety & Security, while age of participants affect negatively to Information, which mean that elder have some cognitive accessibility problems. Moreover, our data shows gender differences in safety perception, since women feel less safe (particularity the youngest) inside the interchange. The results indicate a number of priority measures to enhance. (Author)

  18. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  19. Nuclear Security Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide

    International Nuclear Information System (INIS)

    2013-01-01

    Nuclear terrorism and the illicit trafficking of nuclear and other radioactive material threaten the security of all States. There are large quantities of diverse radioactive material in existence, which are used in areas such as health, the environment, agriculture and industry. The possibility that nuclear and other radioactive material may be used for terrorist acts cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material, and to establish capabilities for detection and response to nuclear and other radioactive material out of regulatory control. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This approach recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in nuclear and other radioactive material; national response plans; and contingency measures. Within its nuclear security programme, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking; and to detect and respond to nuclear security events. This is an Implementing Guide on nuclear security systems and measures for the detection of nuclear and other radioactive material out of regulatory control. The objective of the publication is to provide guidance to Member States for the

  20. [Gymnastic school sport injuries--aspects of preventive measures].

    Science.gov (United States)

    Knobloch, K; Jagodzinski, M; Haasper, C; Zeichen, J; Krettek, C

    2006-06-01

    Gymnastic school sport injuries account for a significant morbidity and mortality among children and adolescents. Preventive issues may be derived from a thorough in-depth analysis of the pattern and circumstances of gymnastic injuries. During a school year among 3993 schools in 43 889 classes with 993 056 pupils 2234 school sport injuries have been reported to the Gemeinde Unfall Versicherung (GUV) Niedersachsen, Germany. Gymnastic sport injuries account for 18 % (403 accidents), which is second after ball sports injuries. Regarding the distribution of the gymnastic disciplines, vault was the major discipline with 34 %, followed by floor exercise (21.3 %), mini- and competition trampoline (16.8 %), and parallel bars (8.2 %). The analysis of the type of injury during vault accidents revealed contusion (31 %) as the predominant injury, followed by sprains (15.4 %), and fractures (15.4 %). Floor exercise injuries distributed among distorsions (26.7 %), contusions (18.6 %), muscle tears (14 %). Back injuries especially of the cervical and thoracic spine, accounted for 40 % of all their injuries. Minor head injuries account for 4.7 % of all floor exercise injuries. Mini-trampoline injuries distribute among contusions (30 %), fractures (22.5 %), distorsions (7.5 %). 21.8 % collisions were noted against a box in comparison to 6.8 % in case of the horse. Gymnast injuries account for a significant number of all school sport related injuries. Vault and floor exercise account for the vast majority of all injuries, with alarming high numbers of spine injuries during floor exercise and mini-trampoline. A preservation of a high level of attention during a sport lesson, safety measures including appropriate mats and landing zones are mandatory to reduce injuries. Muscle injuries and ankle sprains can be prevented by a prospective proprioceptive training intervention to be implemented in school sports.

  1. Study on the concentration of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2002-01-01

    'Energy Security' concept has played the central role in Japan's energy policy. However, the definition of the concept is not clear. If energy security will remain a principal policy target, its concept should be clearly defined as a precondition. This dissertation analyzes historical changes in energy security concept and considers their relationship with the development of national security concept in international relations studies. Following an introduction in the first chapter, the second chapter reveals that energy security concept has changed in accord with energy situation and policymakers' concern of the times. As a result, several different definitions of the concept now coexist. The third chapter deals with the relationship between energy security concept and national security concepts in international relations. Three major definitions of energy security concepts correspond to definitions of security concepts by three schools in security theory - realism, liberalism, and globalism. In the fourth chapter, energy security is conceptualized and its policy measures are systematized by addressing the issues appeared in its historical changes and referring to security theory in international relations studies. The fifth chapter discusses the contribution by nuclear energy to Japan's energy security, applying a theoretical framework presented in previous chapters. Characteristics of nuclear energy which enhance energy security are identified, and policy measures for improving those characteristics are proposed. (author)

  2. Long-term energy services security: What is it and how can it be measured and valued?

    International Nuclear Information System (INIS)

    Jansen, Jaap C.; Seebregts, Ad J.

    2010-01-01

    The paper reviews some recent approaches towards measuring the extent of long-term energy security and security externality valuation. It starts out to discuss the contextual connotations of notions of 'energy security' in medium to long-term time frames and reviews some indicators that have been proposed to quantify it. Special attention is paid to two of these approaches, which the authors helped to develop, i.e. diversity-based indices and the Supply/Demand Index. The paper takes issue with conventional welfare economic approaches that neglect: (i) the scope on the demand side for raising security and (ii) negative feedback mechanisms of socio-political impacts of international rent transfers in fossil fuels exporting countries. The concept of energy services security is proposed with a demand-side focus. This enables application of an integrated approach to gauge the resilience of a society to meet the needs of its population for energy services over longer timescales ahead from various interrelated perspectives. Propositions are made on the attribution of security externalities to the use of fossil fuels, policies, and suggestions for further improvements of measures for energy services security.

  3. Security measurements and radiological protection in the source panoramic irradiators and storage in pool

    International Nuclear Information System (INIS)

    Del Valle O, C.

    1996-01-01

    The aim of this paper is to investigate and to study the safety and protecting measurements that must be taken into account in the design and the use of panoramic source irradiators with wet storage or pool, concerning to category IV. The generic characteristics in plants of kind, as well as their description, are mentioned in this paper. The devices, that comply the security and control systems based on their redundancy, diversity and independence, are examined. Likewise, it describes the design requirements of the overcast, of the irradiators, of the source frame, of the transporting system of product, of the procedure access, of the security system of the irradiator shelf control, of the irradiation room, of the irradiation storage pool, of the ventilation system, for the protection in case of fire of fire, for electric energy failures, for the warning symbols and signs. It contains scope about the organization and responsibilities that must be taken into account in plants of this type. A detailed plan has been made for its operation and maintenance, enclosing instructions and registers for this reason. The statement of emergency events and their respective answers, the analysis of cases and reasons that causes accidents and its implementation and regular inspection procedures for the improvement of the plant are also studied. (author). 2 refs

  4. Measuring up to the Model: A Ranking of State Public Charter School Laws. Ninth Annual Edition

    Science.gov (United States)

    Ziebarth, Todd; Palmer, Louann Bierlein

    2018-01-01

    This ninth edition of "Measuring up to the Model: A Ranking of State Charter School Laws" presents the latest activity in charter public school legislation across the country. For the second year in a row, the 2018 rankings measure each state's charter school law against the National Alliance's updated model charter school law, "New…

  5. The Assessment of School Climate: Review and Appraisal of Published Student-Report Measures

    Science.gov (United States)

    Ramelow, Daniela; Currie, Dorothy; Felder-Puig, Rosemarie

    2015-01-01

    School climate measurement is a long-standing topic in educational research. This review article provides an overview and appraisal of school climate measures published between 2003 and 2013 in scientific journals. A search for published school climate instruments for secondary school students was made in three databases. Twelve articles meeting…

  6. Measuring the Return on Investment of Nuclear Security Training: The Case of the WINS Academy Professional Society

    International Nuclear Information System (INIS)

    Battistella, B.; Howsley, R.; Johnson, D.

    2015-01-01

    The challenges inherent in managing nuclear and radiological materials are complex and growing; ensuring that such materials remain secure requires competent management supported by ongoing training. The nuclear industry is increasingly becoming aware of the need for nuclear security: numerous dedicated training centres have been established worldwide and the IAEA holds approximately 60 international nuclear security training events annually. International training programmes have been conducted in various fields over decades but assessing their value and having the assurance that these training have had a sustainable impact remain difficult. In the field of nuclear security training, no assessment is being made of the degree to which the investment made is making a difference in building sustainable capacity and capability. This paper aims to discuss a methodology to assess the return on investment of nuclear security training. WINS has established a new professional society called the WINS Academy Alumni, for those individuals who have achieved certification through the WINS Academy. This platform proposes a structure, based on established competency frameworks, through which to measure the return on investment and performance improvement of nuclear security training. The objectives of the WINS Academy society are to stay engaged with certified Alumni, track their continued professional development progress, provide them with additional opportunities, and encourage their continued security competence through recertification. We envision that these certified practitioners will in turn promote certification and continual professional development among their peers to help build a network of security-trained professionals that will lead to meaningful and sustainable changes to security culture worldwide. In the long run (5–10 years), we envision that this group will be at the forefront of new professional requirements for nuclear security competence, with

  7. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  8. Food safety security: a new concept for enhancing food safety measures.

    Science.gov (United States)

    Iyengar, Venkatesh; Elmadfa, Ibrahim

    2012-06-01

    The food safety security (FSS) concept is perceived as an early warning system for minimizing food safety (FS) breaches, and it functions in conjunction with existing FS measures. Essentially, the function of FS and FSS measures can be visualized in two parts: (i) the FS preventive measures as actions taken at the stem level, and (ii) the FSS interventions as actions taken at the root level, to enhance the impact of the implemented safety steps. In practice, along with FS, FSS also draws its support from (i) legislative directives and regulatory measures for enforcing verifiable, timely, and effective compliance; (ii) measurement systems in place for sustained quality assurance; and (iii) shared responsibility to ensure cohesion among all the stakeholders namely, policy makers, regulators, food producers, processors and distributors, and consumers. However, the functional framework of FSS differs from that of FS by way of: (i) retooling the vulnerable segments of the preventive features of existing FS measures; (ii) fine-tuning response systems to efficiently preempt the FS breaches; (iii) building a long-term nutrient and toxicant surveillance network based on validated measurement systems functioning in real time; (iv) focusing on crisp, clear, and correct communication that resonates among all the stakeholders; and (v) developing inter-disciplinary human resources to meet ever-increasing FS challenges. Important determinants of FSS include: (i) strengthening international dialogue for refining regulatory reforms and addressing emerging risks; (ii) developing innovative and strategic action points for intervention {in addition to Hazard Analysis and Critical Control Points (HACCP) procedures]; and (iii) introducing additional science-based tools such as metrology-based measurement systems.

  9. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

    Directory of Open Access Journals (Sweden)

    Ashish Rauniyar

    2018-01-01

    Full Text Available With the advent of Internet of things (IoT and cloud computing technologies, we are in the era of automation, device-to-device (D2D and machine-to-machine (M2M communications. Automated vehicles have recently gained a huge attention worldwide, and it has created a new wave of revolution in automobile industries. However, in order to fully establish automated vehicles and their connectivity to the surroundings, security, privacy, and dependability always remain a crucial issue. One cannot deny the fact that such automatic vehicles are highly vulnerable to different kinds of security attacks. Also, today’s such systems are built from generic components. Prior analysis of different attack trends and vulnerabilities enables us to deploy security solutions effectively. Moreover, scientific research has shown that a “group” can perform better than individuals in making decisions and predictions. Therefore, this paper deals with the measurable security, privacy, and dependability of automated vehicles through the crowd-based intelligence approach that is inspired from swarm intelligence. We have studied three use case scenarios of automated vehicles and systems with vehicular fog and have analyzed the security, privacy, and dependability metrics of such systems. Our systematic approaches to measuring efficient system configuration, security, privacy, and dependability of automated vehicles are essential for getting the overall picture of the system such as design patterns, best practices for configuration of system, metrics, and measurements.

  10. Supporting Applications Development and Operation Using IT Security and Audit Measures

    Directory of Open Access Journals (Sweden)

    Katalin Szenes

    2012-01-01

    Full Text Available The market success of the enterprises depends on the ability to support their business processes. This involves the requirement of a seamless, well-ordered operation of the whole company. Operation is greatly affected by the quality of its IT support. The information should be available, handled confidentially, preserving its integrity, have to be processed in a reliable, efficient, effective way, in compliance with the requirements of supervisory authorities. Extending the scope of these information criteria to criteria determining operations quality and adding two business-level requirements to them makes possible to find preventive, detective andcorrective, originally information security control measures, raised to the level of operational quality, that support the market success of the institutions.

  11. Measuring the security of external energy supply in the European Union

    Energy Technology Data Exchange (ETDEWEB)

    Le Coq, Chloe [SITE, Stockholm School of Economics, P.O. Box 6501, Stockholm 11383 (Sweden); Paltseva, Elena [Department of Economics, Copenhagen University, Oester Farimagsgade 5, Building 26, 1353 Copenhagen (Denmark)

    2009-11-15

    The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political risks of the supplying country, risk associated with energy transit, and the economic impact of a supply disruption. We construct separate indexes for three primary energy types, oil, gas and coal, and demonstrate that Member States' levels of supply risk exposure differ across energies. Most other studies of this kind provide aggregate indexes combining different types of energy. Our results suggest that an aggregate approach could be misleading, at least for discussions of the short-term response to risks. We discuss the implications of our findings for the common energy policy. (author)

  12. Measurement issues associated with using survey data matched with administrative data from the Social Security Administration.

    Science.gov (United States)

    Davies, Paul S; Fisher, T Lynn

    2009-01-01

    Researchers using survey data matched with administrative data benefit from the rich demographic and economic detail available from survey data combined with detailed programmatic data from administrative records. The research benefits of using these matched data are too numerous to mention. But there are drawbacks as well, and those drawbacks have received less systematic attention from researchers. We focus on survey data matched with administrative data from the Social Security Administration and address the strengths and weaknesses of each in four specific areas: (1) program participation and benefits, (2) disability and health information, (3) earnings, and (4) deferred compensation. We discuss the implications of these strengths and weaknesses for decisions that researchers must make regarding the appropriate data source and definition for the concepts in question. From this discussion, some general conclusions are drawn about measurement issues associated with using matched survey and administrative data for research, policy evaluation, and statistics.

  13. reCAPTCHA: human-based character recognition via Web security measures.

    Science.gov (United States)

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  14. Measuring the security of external energy supply in the European Union

    International Nuclear Information System (INIS)

    Le Coq, Chloe; Paltseva, Elena

    2009-01-01

    The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political risks of the supplying country, risk associated with energy transit, and the economic impact of a supply disruption. We construct separate indexes for three primary energy types, oil, gas and coal, and demonstrate that Member States' levels of supply risk exposure differ across energies. Most other studies of this kind provide aggregate indexes combining different types of energy. Our results suggest that an aggregate approach could be misleading, at least for discussions of the short-term response to risks. We discuss the implications of our findings for the common energy policy. (author)

  15. Risk Assessment Generated by Usage of ICT and Information Security Measures

    Directory of Open Access Journals (Sweden)

    Ilie TAMAS

    2006-01-01

    Full Text Available Information societies involve the usage of information technology and communications (ITC on a large scale. The dependence on ITC is an unquestionable problem in the present, because we assist to a generality of computers usage in all economic and social life activities. That is why organization information systems became accessible at the global level and there are permanently open for a quick exchange of information between different categories of users located by different geographical nods. The ITC usage involves the existing of some risks that should be known, evaluation and based on these, we must have information systems security measure. We consider that the risk is an indicator very important that must be permanently assess in the usage process of the information system based on ITC. Risk management suppose a permanently evaluation of these problems and also restrain by some practical actions who goes to the decrease of its effects. From the expose point of view, in this paper work it is presented the results of research based on specialty literature and current cases from practical activities, regarding the risks of ITC usage and their diminishing measure. There are distinguished the main factors (threat, vulnerability and impact who affect the information risk and on the other way, diminishing measure of the action to these factors for optimum working of an economic and social organism who use ITC. We consider that through proposed measures we assume safety in design process, implement and usage of the informational systems based on ITC.

  16. Radon in schools. An elevation measurement in schools in Baden-Wuerttemberg

    International Nuclear Information System (INIS)

    Fesenbeck, I.; Naber, C.; Frank, G.; Wilhelm, C.; Schaller, M.

    2016-01-01

    With an effective dose of about 1.1 mSv per year, radon and its secondary products have the biggest share in the population's natural radiation exposure. For implementation of the new EU directive 2013/59/EURATOM dated January 17, 2014, it is now planned to adapt the limit values of the Radiation Protection Ordinance and to extend the scope of validity in the EU member states. The ''Radon at Schools'' project is to cover an area-wide survey of radon concentrations in room air of schools in Baden-Wuerttemberg. Potential hazards caused by radon-222 and secondary products of radon are to be studied. For the project, 1600 schools were selected and requested to participate by an information letter. Half of the schools is distributed over the entire area of Baden-Wuerttemberg. The other half is located in areas of increased radon potential. Radon concentration in room air is determined passively by Karlsruhe radon exposimeters. Subsequently, active radon measurements will be made at conspicuous schools and information events will be offered for municipalities, teachers, interested parents, and pupils.

  17. Securing a (New) Seat at the Table: Distributed Leadership and School Psychologists

    Science.gov (United States)

    Enz, Ashley; McCullum, Charcelor

    2018-01-01

    In a time of greater demands on school systems and increased strain on human and material resources, the need for expanded leadership models is becoming increasingly apparent. As a result, educational stakeholders are investing in leadership roles beyond the traditional school administrators, engaging various educators' leadership capacities at…

  18. Cyber-Security Concerns Mount as Student Hacking Hits Schools: Districts Straining to Safeguard Online Networks

    Science.gov (United States)

    Borja, Rhea R.

    2006-01-01

    While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…

  19. Tecnologias mas nuevas para la seguridad escolar (Newer Technologies for School Security). ERIC Digest.

    Science.gov (United States)

    Schneider, Tod

    This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…

  20. Nutrition and food security in rural China: An assessment of school ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The school feeding system in China provides 180 to 200 days of meals a year to ... to their health and nutritional status, school attendance, and educational outcomes. ... IDRC congratulates first cohort of Women in Climate Change Science Fellows ... conference of McGill's Institute for the Study of International Development.

  1. Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools

    Science.gov (United States)

    Fleming, Antoine

    2017-01-01

    Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…

  2. Measuring energy security performance within China: Toward an inter-provincial prospective

    International Nuclear Information System (INIS)

    Zhang, Long; Yu, Jing; Sovacool, Benjamin K.; Ren, Jingzheng

    2017-01-01

    China has been the world's largest energy consumer and producer for many years, yet while myriad studies have investigated Chinese performance on energy metrics compared to other countries, few to none have looked internally at Chinese provinces. This paper firstly develops a five-dimensional evaluation system centered on the energy security dimensions of availability and diversity, affordability and equality, technology and efficiency, environmental sustainability, and governance and innovation. It then correlates these dimensions to 20 distinct energy security metrics that are used to assess the energy security performance of 30 Chinese provinces, divided into eight regions. Our results reveal both trends in energy policy and practice as well as provincial status of comparative energy security for the year 2013. We find, for instance, that there is no province which performs well in all five of the energy security dimensions, and that all provinces confronted threats related to energy availability and diversity. We also demonstrate that in comparative terms, the Middle Reaches of Yellow River and the Northwest were the most energy-secure, while the Middle Reaches of Yangtze River and the Northeast were least energy-secure. - Highlights: • We assessed energy security for 30 Chinese provinces across five dimensions. • Fuzzy AHP, PROMETHEE and Sensitivity Analysis are used to investigate. • Western provinces perform better performance than eastern provinces in 2013. • Energy availability and diversity is the most severe threat facing China's energy security. • Developing renewable energy will help improve China's Provincial energy security significantly.

  3. Fluctuations of Internal Transmittance in Security of Measurement-Device-Independent Quantum Key Distribution with an Untrusted Source*

    International Nuclear Information System (INIS)

    Wang Yang; Bao Wan-Su; Chen Rui-Ke; Zhou Chun; Jiang Mu-Sheng; Li Hong-Wei

    2017-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlie’s mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations . (paper)

  4. School Climate: An Essential Component of a Comprehensive School Safety Plan

    Science.gov (United States)

    Stark, Heidi

    2017-01-01

    The intentional assessment and management of school climate is an essential component of a comprehensive school safety plan. The value of this preventive aspect of school safety is often diminished as schools invest resources in physical security measures as a narrowly focused effort to increase school safety (Addington, 2009). This dissertation…

  5. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  6. Violent Extremism, National Security and Prevention. Institutional Discourses and Their Implications for Schooling

    Science.gov (United States)

    Mattsson, Christer; Säljö, Roger

    2018-01-01

    Currently, threats to societal security from extremist groups are high on the political agenda in many countries. Politicians, policymakers at various levels and communities are searching for methods to counteract recruitment to violent organizations. These efforts are often referred to as Prevention of Violent Extremism (PVE-programmes). One of…

  7. Measuring the burden of preventable diabetic hospitalisations in the Mexican Institute of Social Security (IMSS).

    Science.gov (United States)

    Lugo-Palacios, David G; Cairns, John; Masetto, Cynthia

    2016-08-02

    The prevalence of diabetes among adults in Mexico has increased markedly from 6.7 % in 1994 to 14.7 % in 2015. Although the main diabetic complications can be prevented or delayed with timely and effective primary care, a high percentage of diabetic patients have developed them imposing an important preventable burden on Mexican society and on the health system. This paper estimates the financial and health burden caused by potentially preventable hospitalisations due to diabetic complications in hospitals operated by the largest social security institution in Latin America, the Mexican Institute of Social Security (IMSS), in the period 2007-2014. Hospitalisations in IMSS hospitals whose main cause was a diabetic complication were identified. The financial burden was estimated using IMSS diagnostic-related groups. To estimate the health burden, DALYs were computed under the assumption that patients would not have experienced complications if they had received timely and effective primary care. A total of 322,977 hospitalisations due to five diabetic complications were identified during the period studied, of which hospitalisations due to kidney failure and diabetic foot represent 78 %. The financial burden increased by 8.4 % in real terms between 2007 and 2014. However, when measured as cost per IMSS affiliate, it decreased by 11.3 %. The health burden had an overall decrease of 13.6 % and the associated DALYs in 2014 reached 103,688. Resources used for the hospital treatment of diabetic complications are then not available for other health care interventions. In order to prevent these hospitalisations more resources might need to be invested in primary care; the first step could be to consider the financial burden of these hospitalisations as a potential target for switching resources from hospital care to primary care services. However, more evidence of the effectiveness of different primary care interventions is needed to know how much of the burden could

  8. Measurement invariance of an instrument assessing sustainability of school-based universal behavior practices.

    Science.gov (United States)

    Mercer, Sterett H; McIntosh, Kent; Strickland-Cohen, M Kathleen; Horner, Robert H

    2014-06-01

    The purpose of the study was to examine the extent to which the School-Wide Universal Behavior Sustainability Index: School Teams (SUBSIST; McIntosh, Doolittle, Vincent, Horner, & Ervin, 2009), a measure of school and district contextual factors that promote the sustainability of school practices, demonstrated measurement invariance across groups of schools that differed in length of time implementing school-wide Positive Behavioral Interventions and Supports (PBIS; Sugai & Horner, 2009), student ethnic composition, and student socioeconomic status (SES). School PBIS team members and district coaches representing 860 schools in 14 U.S. states completed the SUBSIST. Findings supported strong measurement invariance, for all items except 1, of a model with two school-level factors (School Priority and Team Use of Data) and 2 district-level factors (District Priority and Capacity Building) across groups of schools at initial implementation, institutionalization, and sustainability phases of PBIS implementation. Schools in the sustainability phase were rated significantly higher on School Priority and Team Use of Data than schools in initial implementation. Strong measurement invariance held across groups of schools that differed in student ethnicity and SES. The findings regarding measurement invariance are important for future longitudinal investigations of factors that may promote the sustained implementation of school practices. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  9. Building a Better Measure of School Quality: A New Framework for Measuring School Quality Represents a Fuller Picture of What People Care about in a School

    Science.gov (United States)

    Schneider, Jack; Jacobsen, Rebecca; White, Rachel; Gehlbach, Hunter

    2017-01-01

    When it comes to measuring the quality of a school, policy leaders tend to embrace standardized tests as the go-to indicator, whereas parents and community members tend to rely on reputation, word-of-mouth, and what they perceive with their own eyes. The authors suggest a better approach: a new framework that looks at three categories of inputs…

  10. Un-"Chartered" Waters: Balancing Montessori Curriculum and Accountability Measures in a Charter School

    Science.gov (United States)

    Scott, Catherine M.

    2017-01-01

    More than 6,000 charter schools exist in the United States, and of these 120 are Montessori charter schools. When studying charter school practices, researchers often examine issues such as performance accountability measures and effectiveness of charter school curricula. In doing so, the outcomes often overlook the challenges for teachers as they…

  11. An Integrated Intranet and Dynamic Database Application for the Security Manager at Naval Postgraduate School

    Science.gov (United States)

    2002-09-01

    Basic for Applications ( VBA ) 6.0 as macros may not be supported in 8 future versions of Access. Access 2000 offers Internet- related features for...security features from Microsoft’s SQL Server. [1] 3. System Requirements Access 2000 is a resource-intensive application as are all Office 2000...1] • Modules – Functions and procedures written in the Visual Basic for Applications ( VBA ) programming language. The capabilities of modules

  12. Cost-effectiveness of Security Measures: A model-based Framework

    NARCIS (Netherlands)

    Pieters, Wolter; Probst, Christian W.; Lukszo, Zofia; Montoya, L.; Tsiakis, Theodosios; Kargidis, Theodorus; Katsaros, Panagiotis

    Recently, cyber security has become an important topic on the agenda of many organisations. It is already widely acknowledged that attacks do happen, and decision makers face the problem of how to respond. As it is almost impossible to secure a complex system completely, it is important to have an

  13. Beyond Measure: New Approaches to Analyzing Congressional Oversight of Homeland Security

    Science.gov (United States)

    2015-03-01

    published books and peer reviewed journal articles. The Congressional Research Service being the key source on congressional procedure and theory ...Transportation Committee 1 Senate Homeland Security & Governmental Affairs Committee 15 Senate Small Business & Entrepreneurship 1 Senate Special...military contracting procedures in a war zone are not necessarily oversight of national security functions, reviews of FEMA contracting practices

  14. Characterizing the IPv6 Security Landscape by Large-Scale Measurements

    NARCIS (Netherlands)

    Hendriks, Luuk; Sperotto, Anna; Pras, Aiko

    2015-01-01

    Networks are transitioning from IP version 4 to the new version 6. Fundamental differences in the protocols introduce new security challenges with varying levels of evidence. As enabling IPv6 in an existing network is often already challenging on the functional level, security aspects are

  15. The elementary school teachers’ ability in the length measurement

    Science.gov (United States)

    Julie, Hongki

    2017-09-01

    The purpose of this study was to describe the elementary school teachers' mathematical ability (1) to develop students’ activities which constructed longer than, shorter than, and as long as concepts, (2) to develop students’ activities which constructed standard unit on the length measurement, and (3) to develop a problem which used by student to construct why a conversion activity on the unit of the length was useful in the daily life after they have participated in the Realistic Mathematics Education (RME) workshops. Curry and Outhread said if teachers knew more about the growth of students’ conceptual understanding of the length, they would be better able to teach that topic [4]. Therefore, in the workshop, teachers were asked to learn more on the stages of the measurement teaching and learning process and why each stage was important. This capability was described by the results of a test which was content of four problems given to teachers after they have attended the workshop. Research subjects in this study were 14 elementary school teachers at Yogyakarta. The results of the study were as follows: (1) only four of 14 teachers who had the first ability; (2) all teachers had the second ability; and (3) all the teachers did not have the third ability.

  16. Reliability and validity in measuring the value added of schools

    NARCIS (Netherlands)

    van de Grift, Wim

    2009-01-01

    Instability in the school population between school entrance and school leaving is not just a problem of missing data but often the visible result of the educational problems in some schools and is, therefore, not merely to be treated as missing data but as indicator for the quality of educational

  17. Gauging the System: Trends in School Climate Measurement and Intervention

    Science.gov (United States)

    O'Malley, Meagan; Katz, Kristin; Renshaw, Tyler L.; Furlong, Michael J.

    2011-01-01

    Researchers and educators are giving increasing scrutiny to systems-level constructs that contribute to safe, supportive, and effective schools, including school climate. School climate is a multifaceted construct that is commonly conceptualized as school community members' subjective experiences of the structural and contextual elements of a…

  18. Perceived Safety at Work in the Wake of Terror: The Importance of Security Measures and Emergency Preparedness.

    Science.gov (United States)

    Nissen, Alexander; Heir, Trond

    2016-12-01

    We aimed to explore how perceived safety after terrorism is connected to views on security measures and emergency preparedness in a workplace setting. Using a questionnaire-based, cross-sectional study of ministerial employees in Norway who were targeted in a terrorist attack in 2011 (n=3344), we investigated how employees' perceived safety at work 9 to 10 months after the attack was associated with their perceptions of whether security measures were sufficiently prioritized at work, whether there had been sufficient escape and evacuation training, and whether they were confident with evacuation procedures. We found strong evidence of increasing perceived safety at work the more employees believed security measures were sufficiently prioritized at work (partially confounded by post-traumatic stress disorder), and the better their knowledge of evacuation procedures (modified by gender and education). The present study suggests that employers may enhance perceived safety at work for terror-exposed employees by showing a commitment to security measures and by ensuring employees know evacuation procedures well. More research is needed to investigate causality patterns behind the associations found in this cross-sectional study. (Disaster Med Public Health Preparedness. 2016;10:805-811).

  19. School Psychologists: Leaders for Change Building a Secure Future for Children. CASS Digest.

    Science.gov (United States)

    Kelly, Carol

    This digest examines the role of school psychologists in improving educational opportunities for children and adolescents. A variety of issues that affect children and their ability to learn are discussed: widening social class differences and increases in the number of children living in poverty; changing value systems; family disintegration;…

  20. Evaluating Retirement Income Security for Illinois Public School Teachers. Public Pension Project Report

    Science.gov (United States)

    Johnson, Richard W.; Southgate, Benjamin G.

    2014-01-01

    The financial problems afflicting the Illinois teacher pension plan have grabbed headlines. An equally important problem, though underappreciated, is that relatively few teachers benefit much from the plan. This report evaluates the pension benefits provided to Illinois public school teachers. The researchers project annual and lifetime pension…

  1. ANTHROPOMETRIC MEASUREMENT OF PRIMARY SCHOOL GOING CHILDREN IN KARACHI

    Directory of Open Access Journals (Sweden)

    Kashmala Khan

    2016-04-01

    Full Text Available Background: Children were major part of our society and their health issues were too much, so it’s necessary that child should b healthy so their health assessment is important worldwide the acceptable method for assessment of health status is anthropometry (weight & height. This study was done to assess the anthropometric measurement of primary school going children of Karachi, sindh Pakistan, and evaluate how much students were underweight. Methods: The study was done in different primary school of Karachi including private semiprivate and government. The study design was cross sectional study. The sample size of our study was 240, including both genders male& female with range between 7-12 years. Result: The result shows that 34.9% were underweight (below 5th percentile, 63.44% were normal weight (between 5-95th percentile and only0.8% overweight (above 95th percentile.The result showed male-female ratio was 51.5% boys and 48.5% were underweight. The prevalence of underweight in private sector was only 9.5% but in government it was 45.5%.The height of student also calculated and 26.3% children were below the 5th percentile of height for the age, 62.8% were between 5th to 95th percentile and 10.9% above 95thpercentile. Conclusion: The prevalence of underweight in primary school going children in Karachi shows the dietary requirements of children are not fulfilled properly and this may lead to many sever pathological conditions, so it is necessary to take positive steps regarding awareness of proper diet, hygiene and growth & development of child.

  2. Developing a Comparative Measure of the Learning Climate in Professional Schools

    Science.gov (United States)

    Bowen, Donald D.; Kilmann, Ralph H.

    1975-01-01

    The Learning Climate Questionnaire (LCQ) compares the objective properties of schools with measures of overall student satisfaction. The validity of the instrument suggests its use for substantive research investigations into the organizational dynamics of professional schools. (Author/JR)

  3. Cybersecurity via Intermediaries : Analyzing Security Measurements to Understand Intermediary Incentives and Inform Public Policy

    NARCIS (Netherlands)

    Asghari, H.

    2016-01-01

    Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure

  4. Bio-Security Measures Employed by Poultry Farmers in Enugu State ...

    African Journals Online (AJOL)

    User

    In spite of this, food security, improved livelihood and attainment of self- ..... experience in farm business management enables farmers to set realistic time and ... had no significant effect on biosecurity practices of poultry farmers is inconsistent.

  5. Measuring the Effect of Supplemental Nutrition Assistance Program (SNAP) Participation on Food Security.

    OpenAIRE

    James Mabli; Jim Ohls; Lisa Dragoset; Laura Castner; Betsy Santos

    2013-01-01

    The Supplemental Nutrition Assistance Program (SNAP) provides food assistance to more than 47 million low-income Americans every month. It aims to reduce hunger by facilitating beneficiaries’ access to enough food for a healthy, active lifestyle, otherwise known as "food security." Our study conducted for the Food and Nutrition Service of the U.S. Department of Agriculture shows that SNAP participation is associated with improved food security. The study is the largest and most rigorous one...

  6. Defense Logistics Agency Computer-Aided Acquisition and Logistics Support Security Measures

    Science.gov (United States)

    1989-09-29

    sopisit ftre a nduate eiromensweaonsyte dt i vaiou mdi, nfrrngcls- having security features commensurate with today’s weapon system data in various media ...sections, ministrator that has completed an accredited three areas of improvement in security emphasis are APscrt orebfr htst a ecn deemed appropriate...May 1989, been in a hardcopy media and in accordance with Washington, D.C. specific contract clauses and FAR/DFAR. Through CALS, the Government shall

  7. Three blind men and elephant: The Case of energy indices to measure energy security and sustainability

    OpenAIRE

    Kapil Narula; B. Sudhakara Reddy

    2014-01-01

    An 'Energy Index', which is aggregated from energy indicators is a rich source of information and is helpful in providing an assessment of a country's performance. This has, however, resulted in mushrooming of a plethora of indices, which claim to quantify the performance of a country in attaining the goal of energy security and energy sustainability. The paper attempts to compare three different indices, viz., 'Energy Sustainability Index', 'International Index of Energy Security Risk', 'Ene...

  8. Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices

    OpenAIRE

    Kolamunna, Harini; Chauhan, Jagmohan; Hu, Yining; Thilakarathna, Kanchana; Perino, Diego; Makaroff, Dwight; Seneviratne, Aruna

    2016-01-01

    The majority of available wearable devices require communication with Internet servers for data analysis and storage, and rely on a paired smartphone to enable secure communication. However, wearable devices are mostly equipped with WiFi network interfaces, enabling direct communication with the Internet. Secure communication protocols should then run on these wearables itself, yet it is not clear if they can be efficiently supported. In this paper, we show that wearable devices are ready for...

  9. Measuring information security breach impact and uncertainties under various information sharing scenarios

    OpenAIRE

    Durowoju, Olatunde; Chan, Hing; Wang, Xiaojun

    2013-01-01

    This study draws on information theory and aims to provide simulated evidence using real historical and statistical data to demonstrate how various levels of integration moderate the impact and uncertainties of information security breach on supply chain performance. We find that the supply chain behaves differently under various levels of integration when a security breach occurs. The entropy analysis revealed that the wholesaler experience the most uncertainty under system failure and data ...

  10. The Naval Postgraduate School : The Nation's Premier National Security Research University [video

    OpenAIRE

    2010-01-01

    “The best and brightest military officers from the United States and around the world come to the Naval Postgraduate School in Monterey, California, to work with world class faculty on real military and defense problems. At NPS, they gain both the intellectual know how and the practical skills for improving defense technologies, systems and programs.” -- President George H.W. Bush

  11. Measuring School Foodservice Workers’ Perceptions of Organizational Culture

    Science.gov (United States)

    School foodservice workers (SFW) are a direct link to children eating school meals. SFW who perceive positive and supportive organizational culture at their school nutrition departments also may perceive that such environments foster their own promotion of healthful food choices by students. To date...

  12. How best to measure implementation of school health curricula: a comparison of three measures.

    Science.gov (United States)

    Resnicow, K; Davis, M; Smith, M; Lazarus-Yaroch, A; Baranowski, T; Baranowski, J; Doyle, C; Wang, D T

    1998-06-01

    The impact of school health education programs is often attenuated by inadequate teacher implementation. Using data from a school-based nutrition education program delivered in a sample of fifth graders, this study examines the discriminant and predictive validity of three measures of curriculum implementation: class-room observation of fidelity, and two measures of completeness, teacher self-report questionnaire and post-implementation interview. A fourth measure, obtained during teacher observations, that assessed student and teacher interaction and student receptivity to the curriculum (labeled Rapport) was also obtained. Predictive validity was determined by examining the association of implementation measures with three study outcomes; health knowledge, asking behaviors related to fruit and vegetables, and fruit and vegetable intake, assessed by 7-day diary. Of the 37 teachers observed, 21 were observed for two sessions and 16 were observed once. Implementation measures were moderately correlated, an indication of discriminant validity. Predictive validity analyses indicated that the observed fidelity, Rapport and interview measures were significantly correlated with post-test student knowledge. The association between health knowledge and observed fidelity (based on dual observation only), Rapport and interview measures remained significant after adjustment for pre-test knowledge values. None of the implementation variables were significantly associated with student fruit and vegetable intake or asking behaviors controlling for pre-test values. These results indicate that the teacher self-report questionnaire was not a valid measure of implementation completeness in this study. Post-implementation completeness interviews and dual observations of fidelity and Rapport appear to be more valid, and largely independent methods of implementation assessment.

  13. Measuring School Climate: Using Existing Data Tools on Climate and Effectiveness to Inform School Organizational Health

    Science.gov (United States)

    Durham, Rachel E.; Bettencourt, Amie; Connolly, Faith

    2014-01-01

    Despite--or perhaps due to--the lack of consensus on its definition, there is abundant interest in and research on school climate. Researchers have determined that improving school climate is one way to increase academic achievement, school safety, school completion, teacher retention, healthy social interactions, and student well-being (Cohen,…

  14. Who Is Eligible for Free School Meals? Characterising Free School Meals as a Measure of Disadvantage in England

    Science.gov (United States)

    Gorard, Stephen

    2012-01-01

    This paper presents a description of the background characteristics and attainment profile of pupils eligible for free school meals (FSM) in England, and of those missing a value for this variable. Free school meal eligibility is a measure of low parental income, widely used in social policy research as an individual indicator of potential…

  15. Middle School Characteristics That Predict Student Achievement, as Measured by the School-Wide California API Score

    Science.gov (United States)

    Paredes, Josie Abaroa

    2013-01-01

    The purpose of this study was to investigate, through quantitative research, effective middle school characteristics that predict student achievement, as measured by the school-wide California API score. Characteristics were determined using an instrument developed by the Office of Superintendent of Public Instruction (OSPI), which asked middle…

  16. Certified Schools

    Data.gov (United States)

    Department of Homeland Security — Certified schools must provide specific information regarding the school, the nature and requirements of the educational program, location and contact information,...

  17. Security Measures and some Specific Features of the Transport Police Functioning in Russia and Abroad

    Directory of Open Access Journals (Sweden)

    Petr P. Ignatushenko

    2017-03-01

    Full Text Available In the present article specifics of the transport police work in the Russian Federation are discussed, as well as in other countries of the world (USA, Germany, Israel, etc.. Attention is drawn to the need of the role and significance of the Russian police review in the matters of railway and aviation security, as well as safety on river and sea transport. The term “transport security” is a state of security of transport and transport infrastructure, consumers of transport services (passengers from various types of threats (natural and man-made, as well as acts of unlawful interference in the activities of various modes of transport – points put the author. Transport security issues are important for the creation of the transport police system in the Russian Federation, taking into account experience of foreign countries.

  18. Security Analysis of Measurement-Device-Independent Quantum Key Distribution in Collective-Rotation Noisy Environment

    Science.gov (United States)

    Li, Na; Zhang, Yu; Wen, Shuang; Li, Lei-lei; Li, Jian

    2018-01-01

    Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used to analyze the security of the protocol. The maximum amount of information that Eve can eavesdrop is 50%, and the eavesdropping can always be detected if the noise level ɛ ≤ 0.68. Therefore, MDI-QKD protocol is secure as quantum key distribution protocol. The maximum probability that the relay outputs successful results is 16% when existing eavesdropping. Moreover, the probability that the relay outputs successful results when existing eavesdropping is higher than the situation without eavesdropping. The paper validates that MDI-QKD protocol has better robustness.

  19. Wireless Information-Theoretic Security in an Outdoor Topology with Obstacles: Theoretical Analysis and Experimental Measurements

    Directory of Open Access Journals (Sweden)

    Dagiuklas Tasos

    2011-01-01

    Full Text Available This paper presents a Wireless Information-Theoretic Security (WITS scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks. An autonomic network of moving users was implemented via 802.11n nodes of an ad hoc network for an outdoor topology with obstacles. Obstructed-Line-of-Sight (OLOS and Non-Line-of-Sight (NLOS propagation scenarios were examined. Low-speed user movement was considered, so that Doppler spread could be discarded. A transmitter and a legitimate receiver exchanged information in the presence of a moving eavesdropper. Average Signal-to-Noise Ratio (SNR values were acquired for both the main and the wiretap channel, and the Probability of Nonzero Secrecy Capacity was calculated based on theoretical formula. Experimental results validate theoretical findings stressing the importance of user location and mobility schemes on the robustness of Wireless Information-Theoretic Security and call for further theoretical analysis.

  20. Nuclear Security Systems and Measures for the Detection of Nuclear and Other Radioactive Material out of Regulatory Control. Implementing Guide (Arabic Edition)

    International Nuclear Information System (INIS)

    2015-01-01

    This publication provides guidance to Member States for the development, or improvement of nuclear security systems and measures for the detection of criminal or unauthorized acts with nuclear security implications involving nuclear and other radioactive material out of regulatory control. It describes the elements of an effective nuclear security detection architecture which is composed of an integrated set of nuclear security systems and measures, and is based on an appropriate legal and regulatory framework for the implementation of the national detection strategy. The publication is an implementing guide within the IAEA Nuclear Security Series and is intended for use by national policy makers, legislative bodies, competent authorities, institutions, and individuals involved in the establishment, implementation, maintenance or sustainability of nuclear security systems and measures for the detection of nuclear and other radioactive material out of regulatory control

  1. Relationships Among Student, Staff, and Administrative Measures of School Climate and Student Health and Academic Outcomes.

    Science.gov (United States)

    Gase, Lauren N; Gomez, Louis M; Kuo, Tony; Glenn, Beth A; Inkelas, Moira; Ponce, Ninez A

    2017-05-01

    School climate is an integral part of a comprehensive approach to improving the well-being of students; however, little is known about the relationships between its different domains and measures. We examined the relationships between student, staff, and administrative measures of school climate to understand the extent to which they were related to each other and student outcomes. The sample included 33,572 secondary school students from 121 schools in Los Angeles County during the 2014-2015 academic year. A multilevel regression model was constructed to examine the association between the domains and measures of school climate and 5 outcomes of student well-being: depressive symptoms or suicidal ideation, tobacco use, alcohol use, marijuana use, and grades. Student, staff, and administrative measures of school climate were weakly correlated. Strong associations were found between student outcomes and student reports of engagement and safety, while school staff reports and administrative measures of school climate showed limited associations with student outcomes. As schools seek to measure and implement interventions aimed at improving school climate, consideration should be given to grounding these efforts in a multidimensional conceptualization of climate that values student perspectives and includes elements of both engagement and safety. © 2017, American School Health Association.

  2. SAFETY AND SECURITY MEASURES ADOPTED BY THE HOTELS AND THEIR IMPACT ON CUSTOMER RELATIONSHIP MANAGEMENT

    OpenAIRE

    Abhishek Chauhan; Ankit Shukla; Pradeep Negi

    2018-01-01

    Hotel can be defined as “Home away from home” for the guests who come to the hotel as they receive homely environment and services in the hotel. The guests who come to the hotels come with an understanding that they and their belongings would be safe and secured in the hotel during their occupancy in the hotel. The safety and security aspects play a very vital role in hospitality industry as this industry is dependent largely on the customer relationship with the hotel. If the guest encounter...

  3. Adoption of Preventive Measures and Attitudes toward the H1N1 Influenza Pandemic in Schools

    Science.gov (United States)

    Pérez, Anna; Rodríguez, Tània; López, Maria José; Continente, Xavier; Nebot, Manel

    2016-01-01

    Background: This study describes the perceived impact of H1N1 influenza and the adoption of the recommended measures to address the pandemic in schools. Methods: A cross-sectional self-reported survey was conducted in 433 schools in Barcelona addressed to the school principal or the H1N1 influenza designated person. A descriptive analysis was…

  4. A Study of the Stability of School Effectiveness Measures across Grades and Subject Areas.

    Science.gov (United States)

    Mandeville, Garrett K.; Anderson, Lorin W.

    School effectiveness indices (SEIs), based on regressing test performance onto earlier test performance and a socioeconomic status measure, were obtained for eight subject-grade combinations from 485 South Carolina elementary schools. The analysis involved school means based on longitudinally matched student data. Reading and mathematics…

  5. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  6. Do new and renovated schools and kindergartens secure sufficiently high indoor environmental quality?

    DEFF Research Database (Denmark)

    Wargocki, Pawel; Hviid, Christian Anker; Skupien, Agata

    2016-01-01

    or less similar as their conventional counterparts as regards measured parameters of indoor environment. Subjective evaluations made by pupils and teachers did not always match the physical measurements. There were also differences in subjective evaluations made by children and by teachers. In conclusion...

  7. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  8. Methodology of the Auditing Measures to Civil Airport Security and Protection

    Directory of Open Access Journals (Sweden)

    Ján Kolesár

    2016-10-01

    Full Text Available Airports similarly to other companies are certified in compliance with the International Standardization Organization (ISO standards of products and services (series of ISO 9000 Standards regarding quality management, to coordinate the technical side of standardizatioon and normalization at an international scale. In order for the airports to meet the norms and the certification requirements as by the ISO they are liable to undergo strict audits of quality, as a rule, conducted by an independent auditing organization. Focus of the audits is primarily on airport operation economics and security. The article is an analysis into the methodology of the airport security audit processes and activities. Within the framework of planning, the sequence of steps is described in line with the principles and procedures of the Security Management System (SMS and starndards established by the International Standardization Organization (ISO. The methodology of conducting airport security audit is developed in compliance with the national programme and international legislation standards (Annex 17 applicable to protection of civil aviation against acts of unlawful interference.

  9. A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability

    DEFF Research Database (Denmark)

    Pieters, Wolter; van der Ven, Sanne H.G.; Probst, Christian W.

    2012-01-01

    One of the big problems of risk assessment in information security is the quantification of risk-related properties, such as vulnerability. Vulnerability expresses the likelihood that a threat agent acting against an asset will cause impact, for example, the likelihood that an attacker will be ab...... to its application to children solving math problems. It provides an innovative and sound way to quantify vulnerability in models of (information) security.......One of the big problems of risk assessment in information security is the quantification of risk-related properties, such as vulnerability. Vulnerability expresses the likelihood that a threat agent acting against an asset will cause impact, for example, the likelihood that an attacker will be able......-interprets security from the field of Item Response Theory. By observing the success of threat agents against assets, one can rate the strength of threats and controls, and predict the vulnerability of systems to particular threats. The application of Item Response Theory to the field of risk is new, but analogous...

  10. Technology transfer of dynamic IT outsourcing requires security measures in SLAs

    NARCIS (Netherlands)

    F. Dickmann (Frank); M. Brodhun (Maximilian); J. Falkner (Jürgen); T.A. Knoch (Tobias); U. Sax (Ulrich)

    2010-01-01

    textabstractFor the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations. Therefore, it is necessary to determine whether SLAs can improve trust from the

  11. Assessing the Sexual Knowledge of Women in Secure Settings: The Development of a New Screening Measure

    Science.gov (United States)

    Long, Clive G.; Krawczyk, Kirsten M.; Kenworthy, Nathalie E.

    2013-01-01

    Little research has been published on the need for sexual education for women in secure psychiatric facilities when patients present with a combination of learning disability, mental illness and personality disorder. The development of a brief, feasible, gender-speci?c sexual knowledge questionnaire is described, which has

  12. Participation Rate as A Basis for Measuring Food Security Status of Meat

    Directory of Open Access Journals (Sweden)

    Tjeppy D Soedjana

    2013-12-01

    Full Text Available Food security has been developed as way for decision makers to pay more attention to this sector. It is believed that foods which are efficiently produced in one area or country may be accessed by other areas or countries. However, this concept is difficult to be implemented since almost none of countries in the world have all resources to produce what is needed by its people. Food consumption, including beef, would be better measured using participation rate which indicates a cluster of its consumer instead of using all population as a denominator for calculating per capita consumption, except for commodities whose consumer member of its cluster close to 100% of the population. For commodities whose consumers less than 50% of its cluster it is more effective to use the size of the cluster as the denominator. Diversified food consumption of animal origin in Indonesia has been indicated by the fact that it has been naturally established. Animal meat consumption diversification for many reasons is influenced by cultural, preferences or other economic status of the households. This phenomena is also indicated by the magnitude of positive cross price elasticity between beef and mutton, beef and poultry meat, and between poultry meat and fish. Therefore, every effort to push higher consumption of one meat type, will reduce the participation rate of others. Susenas data indicated participation rates for beef and buffalo meat were 26.15% (2002, 21.93% (2005, 16.18% (2008 and 16.16% (2011, while poultry meat had higher participation rate as 65.46% (2002, 63.48% (2005, 57.67% (2008 and 56.98% (2011. Application of participation rate approach on the production of beef and buffalo meat resulted in the annual percapita consumption of 6.71 kg (2002, 10.47 kg (2005, 10.82 kg (2008 and 13.11 kg (2011. It concludes that balanced participation rates of meat components (beef and poultry meat, need to be maintained as the existed diversified meat consumption

  13. Relationships between Student, Staff, and Administrative Measures of School Climate and Student Health and Academic Outcomes

    Science.gov (United States)

    Gase, Lauren Nichol; Gomez, Louis M.; Kuo, Tony; Glenn, Beth A.; Inkelas, Moira; Ponce, Ninez A.

    2018-01-01

    BACKGROUND School climate is an integral part of a comprehensive approach to improving the wellbeing of students; however, little is known about the relationships between its different domains and measures. This study examined the relationships between student, staff, and administrative measures of school climate in order to understand the extent to which they were related to each other and student outcomes. METHODS The sample included 33,572 secondary school students from 121 schools in Los Angeles County during the 2014–2015 academic year. A multilevel regression model was constructed to examine the association between the domains and measures of school climate and five outcomes of student wellbeing: depressive symptoms or suicidal ideation, tobacco use, alcohol use, marijuana use, and grades. RESULTS Student, staff, and administrative measures of school climate were weakly correlated. Strong associations were found between student outcomes and student reports of engagement and safety, while school staff reports and administrative measures of school climate showed limited associations with student outcomes. CONCLUSIONS As schools seek to measure and implement interventions aimed at improving school climate, consideration should be given to grounding these efforts in a multi-dimensional conceptualization of climate that values student perspectives and includes elements of both engagement and safety. PMID:28382671

  14. A Cost Benefit Analysis of Security at the Naval Postgraduate School

    National Research Council Canada - National Science Library

    Lakamp, David

    2003-01-01

    .... The present value approach was used as a guide to compare the cost of preventative measures against a physical attack and the value of benefits preserved by a deterred attack, Often, cost is simply...

  15. Measuring Consumer-Based Brand Equity for Indian Business Schools

    Science.gov (United States)

    Aggarwal Sharma, Ashita; Rao, Vithala R.; Popli, Sapna

    2013-01-01

    Brands are fundamentally about experiences and relationships, and therefore they form prime basis of an institution's connection with their stakeholders. With the mushrooming of business schools (both private autonomous and government supported) and fading global boundaries, especially in the Indian context, communicating a business school brand…

  16. Measuring School Principals' Support for ICT Integration in Palermo, Italy

    Science.gov (United States)

    Polizzi, Gabriella

    2011-01-01

    School principals play an important role in managing media and technology integration into school teaching since they can foster the use of information communication technologies (ICT) at a strategic level, even supporting the introduction of media literacy education activities into teaching. Starting from a review on the role of principals'…

  17. Leading the Way: AFT-WV Advances School Safety Measures

    Science.gov (United States)

    American Federation of Teachers (NJ), 2009

    2009-01-01

    The American Federation of Teachers-West Virginia (AFT-WV) passed safe schools legislation in March 2008. To better understand how AFT-WV influenced the creation and eventual passage of safe schools legislation, several researchers conducted a case study examining the event and the circumstances surrounding it. In particular, they were interested…

  18. Measuring household food security: the global experience A medida da segurança alimentar: a experiência mundial

    Directory of Open Access Journals (Sweden)

    Hugo Melgar-Quinonez

    2008-08-01

    Full Text Available Measuring household food insecurity represents a challenge due to the complexity and wide array of factors associated with this phenomenon. For over one decade, researchers and agencies throughout the world have been using and assessing the validity of variations of the United States Department of Agriculture Household Food Security Supplemental Module. Thanks to numerous studies of diverse design, size, and purpose, the Household Food Security Supplemental Module has shown its suitability to directly evaluate the perceptions of individuals on their food security status. In addition, challenges and limitations are becoming clearer and new research questions are emerging as the process advances. The purpose of this article is to describe the development, validation procedures, and use of the Household Food Security Supplemental Module in very diverse settings. The most common Household Food Security Supplemental Module related studies have been conducted using criterion validity, Rasch modeling and Cronbach-Alpha Coefficient. It is critical that researchers, policy makers, governmental and non-governmental agencies intensify their efforts to further develop tools that provide valid and reliable measures of food security in diverse population groups. Additional work is needed to synthesize a universally applicable tool able to capture the global human phenomenon of food insecurity.Medir a insegurança alimentar domiciliar representa um desafio devido à complexidade e ao vasto número de fatores associados a este fenômeno. Por mais de uma década, pesquisadores e agências em todo o mundo têm usado o Módulo Suplementar da Segurança Alimentar Domiciliar , do Departamento de Agricultura dos Estados Unidos (Household Food Security Supplemental Module, e avaliado suas variações. Graças a numerosos estudos com diversos formatos, extensões e propósitos, a adequação do Household Food Security Supplemental Module para avaliar diretamente a

  19. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  20. Estimating the effectiveness of early control measures through school absenteeism surveillance in observed outbreaks at rural schools in Hubei, China.

    Science.gov (United States)

    Fan, Yunzhou; Yang, Mei; Jiang, Hongbo; Wang, Ying; Yang, Wenwen; Zhang, Zhixia; Yan, Weirong; Diwan, Vinod K; Xu, Biao; Dong, Hengjin; Palm, Lars; Liu, Li; Nie, Shaofa

    2014-01-01

    School absenteeism is a common data source in syndromic surveillance, which allows for the detection of outbreaks at an early stage. Previous studies focused on its correlation with other data sources. In this study, we evaluated the effectiveness of control measures based on early warning signals from school absenteeism surveillance in rural Chinese schools. A school absenteeism surveillance system was established in all 17 primary schools in 3 adjacent towns in the Chinese region of Hubei. Three outbreaks (varicella, mumps, and influenza-like illness) were detected and controlled successfully from April 1, 2012, to January 15, 2014. An impulse susceptible-exposed-infectious-recovered model was used to fit the epidemics of these three outbreaks. Moreover, it simulated the potential epidemics under interventions resulting from traditional surveillance signals. The effectiveness of the absenteeism-based control measures was evaluated by comparing the simulated datasets. The school absenteeism system generated 52 signals. Three outbreaks were verified through epidemiological investigation. Compared to traditional surveillance, the school absenteeism system generated simultaneous signals for the varicella outbreak, but 3 days in advance for the mumps outbreak and 2-4 days in advance for the influenza-like illness outbreak. The estimated excess protection rates of control measures based on early signals were 0.0%, 19.0-44.1%, and 29.0-37.0% for the three outbreaks, respectively. Although not all outbreak control measures can benefit from early signals through school absenteeism surveillance, the effectiveness of early signal-based interventions is obvious. School absenteeism surveillance plays an important role in reducing outbreak spread.

  1. Developing a Measure of Traffic Calming Associated with Elementary School Students’ Active Transport

    OpenAIRE

    Nicholson, Lisa M.; Turner, Lindsey; Slater, Sandy J.; Abuzayd, Haytham; Chriqui, Jamie F.; Chaloupka, Frank

    2014-01-01

    The objective of this study is to develop a measure of traffic calming with nationally available GIS data from NAVTEQ and to validate the traffic calming index with the percentage of children reported by school administrators as walking or biking to school, using data from a nationally representative sample of elementary schools in 2006-2010. Specific models, with and without correlated errors, examined associations of objective GIS measures of the built environment, nationally available from...

  2. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  3. Screening of Energy Renovation Measures for Schools – Denmark

    DEFF Research Database (Denmark)

    Mørck, Ove; Paulsen, Anton; Stiger, Simone

    2013-01-01

    School of the Future’ is a collaborative project within the 7th Framework Programme of the European Union in the energy sector. It started in February 2011 and will run for 5 years. The aim of the “School of the Future” project is to design, demonstrate, evaluate and communicate shining examples...... of how to reach the future high performance building level. School buildings and their primary users: pupils – the next generations – are in the focus of the project. Both, the energy and indoor environment performance of 4 demo buildings in 4 European countries and climates will be greatly improved due...

  4. Security, at what cost? A stated preference approach toward understanding individuals' privacy and civil liberties trade-offs regarding security measures

    NARCIS (Netherlands)

    Robinson, N.; Potoglou, D.

    2010-01-01

    In the presently heightened security environment there are a number of examples of policy that must strike a delicate balance between strengthening security without jeopardising public liberties and personal privacy. The introduction of national identity cards and biometric passports, the expansion

  5. Relationships among Student, Staff, and Administrative Measures of School Climate and Student Health and Academic Outcomes

    Science.gov (United States)

    Gase, Lauren N.; Gomez, Louis M.; Kuo, Tony; Glenn, Beth A.; Inkelas, Moira; Ponce, Ninez A.

    2017-01-01

    Background: School climate is an integral part of a comprehensive approach to improving the well-being of students; however, little is known about the relationships between its different domains and measures. We examined the relationships between student, staff, and administrative measures of school climate to understand the extent to which they…

  6. Connectedness among Taiwanese Middle School Students: A Validation Study of the Hemingway Measure of Adolescent Connectedness.

    Science.gov (United States)

    Karcher, Michael J.; Lee, Yun

    2002-01-01

    Examines the psychometric properties of the Hemingway Measure of Adolescent Connectedness among 320 Taiwanese junior high school students. Finds that connectedness measure subscales and composite scales demonstrated acceptable reliability and concurrent validity. Also finds, among other things, that girls report more connectedness to school than…

  7. A Conceptual Foundation for Measures of Physical Function and Behavioral Health Function for Social Security Work Disability Evaluation

    Science.gov (United States)

    Marfeo, Elizabeth E.; Haley, Stephen M.; Jette, Alan M.; Eisen, Susan V.; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M.; Chan, Leighton; Brandt, Diane E.; Rasch, Elizabeth K.

    2014-01-01

    Physical and mental impairments represent the two largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person’s underlying capabilities as well as activity demands relevant to the context of work. The objective of this paper is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, two content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability, and Health (ICF) as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies five major domains (1) Behavior Control, (2) Basic Interactions, (3) Temperament and Personality, (4) Adaptability, and (5) Workplace Behaviors. The content model describing physical functioning includes three domains (1) Changing and Maintaining Body Position, (2) Whole Body Mobility, and (3) Carrying, Moving and Handling Objects. These content models informed subsequent measurement properties including item development, measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work. PMID:23548543

  8. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries

    International Nuclear Information System (INIS)

    Talarico, Luca; Reniers, Genserik; Sörensen, Kenneth; Springael, Johan

    2015-01-01

    In this paper we present a multi-modal security-transportation model to allocate security resources within a chemical supply chain which is characterized by the use of different transport modes, each having their own security features. We consider security-related risks so as to take measures against terrorist acts which could target critical transportation systems. The idea of addressing security-related issues, by supporting decisions for preventing or mitigating intentional acts on transportation infrastructure, has gained attention in academic research only recently. The decision model presented in this paper is based on game theory and it can be employed to organize intelligence capabilities aimed at securing chemical supply chains. It enables detection and warning against impending attacks on transportation infrastructures and the subsequent adoption of security countermeasures. This is of extreme importance for preventing terrorist attacks and for avoiding (possibly huge) human and economic losses. In our work we also provide data sources and numerical simulations by applying the proposed model to a illustrative multi-modal chemical supply chain. - Highlights: • A model to increase the security in a multimodal chemical supply chain is proposed. • The model considers adaptive opponents having multi-attribute utility functions. • The model is based on game theory using an attacker–defender schema. • The model provides recommendations about where to allocate security measures. • Numerical simulations on a sample multimodal chemical supply chain are shown

  9. Accident prevention and security measures to prevent intentional harm and damage through nuclear energy

    International Nuclear Information System (INIS)

    Rauschning, D.

    1984-01-01

    The author explains the authorities' duty to provide for protection against intentional damage or physical harm through the use of nuclear energy. It belongs to the competence of the various authorities to define ways and means to afford protection, and to establish an appropriate network of provisions. There are provisions belonging to criminal law, those concerning liability and indemnity, and security regulations incorporated in the law on licensing and supervision. The author presents a detailed account of the law applicable and discusses the conflict of interests between governmental duties and intentions and the civil rights of the individual affected by the provisions. (HSCH) [de

  10. New security measures are proposed for N-plants: Insider Rule package is issued by NRC

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    New rules proposed by the Nuclear Regulatory Commission (NRC) will require background investigations and psychological assessments of new job candidates and continual monitoring of the behavior of all power plant workers with access to sensitive areas. Licensees will have to submit an ''access authorization'' program for approval describing how they will conduct these security activities. The employee checks will go back five years to examine credit, educational, and criminal histories. Implementation of the rules could involve the Edison Electric Institute as an intermediary to funnel criminal checks from the Justice Department and FBI. The NRC is also considering a clarification of areas designated as ''vital'' because current designations may be too strict

  11. Impact of Tourette Syndrome on School Measures in a Nationally Representative Sample

    Science.gov (United States)

    Claussen, Angelika H.; Bitsko, Rebecca H.; Holbrook, Joseph R.; Bloomfield, Jeanette; Giordano, Kathy

    2018-01-01

    Objective Children with Tourette syndrome (TS) are at risk for a variety of co-occurring conditions and learning and school problems. The purpose of this study was to determine the impact of TS and co-occurring conditions on school measures. Methods Parent-reported data from the 2007–2008 and 2011–2012 National Survey of Children’s Health were combined (n = 129,353 children aged 6–17 yrs). Parent report of health care provider diagnosis of TS; co-occurring mental, emotional, and behavioral conditions; learning and language conditions; and school measures were assessed. School measures included type of school, individual education plan (IEP), number of school days missed, school problems, doing well in school, doing homework, and repeating a grade. Children with TS were compared with those who never had TS on school measures accounting for co-occurring conditions. Results After adjusting for demographics, compared with children without TS, children currently with TS were more likely to have an IEP, have a parent contacted about school problems, and not complete homework. After further adjusting for co-occurring conditions, only IEP status remained statistically significant. Compared with children with mild TS, children with moderate or severe TS were more likely to have an IEP, repeat a grade, encounter school problems, and not care about doing well in school. Conclusion Tourette syndrome severity and co-occurring conditions are associated with school challenges and educational service needs. Awareness among health care providers, teachers and parents of the potential challenges related to both TS and co-occurring conditions would help to best support the child’s education. PMID:29432328

  12. Impact of Tourette Syndrome on School Measures in a Nationally Representative Sample.

    Science.gov (United States)

    Claussen, Angelika H; Bitsko, Rebecca H; Holbrook, Joseph R; Bloomfield, Jeanette; Giordano, Kathy

    2018-05-01

    Children with Tourette syndrome (TS) are at risk for a variety of co-occurring conditions and learning and school problems. The purpose of this study was to determine the impact of TS and co-occurring conditions on school measures. Parent-reported data from the 2007-2008 and 2011-2012 National Survey of Children's Health were combined (n = 129,353 children aged 6-17 yrs). Parent report of health care provider diagnosis of TS; co-occurring mental, emotional, and behavioral conditions; learning and language conditions; and school measures were assessed. School measures included type of school, individual education plan (IEP), number of school days missed, school problems, doing well in school, doing homework, and repeating a grade. Children with TS were compared with those who never had TS on school measures accounting for co-occurring conditions. After adjusting for demographics, compared with children without TS, children currently with TS were more likely to have an IEP, have a parent contacted about school problems, and not complete homework. After further adjusting for co-occurring conditions, only IEP status remained statistically significant. Compared with children with mild TS, children with moderate or severe TS were more likely to have an IEP, repeat a grade, encounter school problems, and not care about doing well in school. Tourette syndrome severity and co-occurring conditions are associated with school challenges and educational service needs. Awareness among health care providers, teachers and parents of the potential challenges related to both TS and co-occurring conditions would help to best support the child's education.

  13. Investigating the issue of copyright and security measures in digital libraries

    Directory of Open Access Journals (Sweden)

    Sedigheh Ahmadi Fasih

    2013-11-01

    Full Text Available During the past few years, digital libraries have been the primary source of retrieving necessary information. IT helps many scholars have the access to recently published value added researches around the world. However, information security and copyright concerns are among the most important issues and there must be good rules and regulation to protect authors against any sort of copyright violation. In this paper, we present an empirical investigation to find out about the status of copyright issues in one of Iranian libraries. The proposed study of this paper designs a questionnaire in Likert scale and distributes it among 96 librarian experts. Cronbach alpha is equal to 0.76, which is well above the minimum acceptable level. The results of our investigation indicate that although expert believe the status of copyright is in desirable level when the level of significance is five percent, there are some concerns on some issues. In other words, experts believed that all copyrights are not well protected and digital libraries do not follow governmental rules and regulation on fully protecting authors’ rights. In addition, experts believed that the security of sources available on digital libraries is not well protected.

  14. Public Schools Energy Conservation Measures, Report Number 4: Hindman Elementary School, Hindman, Kentucky.

    Science.gov (United States)

    American Association of School Administrators, Arlington, VA.

    Presented is a study identifying and evaluating opportunities for decreasing energy use at Hindman Elementary School, Hindman, Kentucky. Methods used in this engineering investigation include building surveys, computer simulations and cost estimates. Findings revealed that modifications to the school's boiler, temperature controls, electrical…

  15. Assessing the internal validity of a household survey-based food security measure adapted for use in Iran

    Directory of Open Access Journals (Sweden)

    Sadeghizadeh Atefeh

    2009-06-01

    Full Text Available Abstract Background The prevalence of food insecurity is an indicator of material well-being in an area of basic need. The U.S. Food Security Module has been adapted for use in a wide variety of cultural and linguistic settings around the world. We assessed the internal validity of the adapted U.S. Household Food Security Survey Module to measure adult and child food insecurity in Isfahan, Iran, using statistical methods based on the Rasch measurement model. Methods The U.S. Household Food Security Survey Module was translated into Farsi and after adaptation, administered to a representative sample. Data were provided by 2,004 randomly selected households from all sectors of the population of Isfahan, Iran, during 2005. Results 53.1 percent reported that their food had run out at some time during the previous 12 months and they did not have money to buy more, while 26.7 percent reported that an adult had cut the size of a meal or skipped a meal because there was not enough money for food, and 7.2 percent reported that an adult did not eat for a whole day because there was not enough money for food. The severity of the items in the adult scale, estimated under Rasch-model assumptions, covered a range of 6.65 logistic units, and those in the child scale 11.68 logistic units. Most Item-infit statistics were near unity, and none exceeded 1.20. Conclusion The range of severity of items provides measurement coverage across a wide range of severity of food insecurity for both adults and children. Both scales demonstrated acceptable levels of internal validity, although several items should be improved. The similarity of the response patterns in the Isfahan and the U.S. suggests that food insecurity is experienced, managed, and described similarly in the two countries.

  16. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  17. Measuring Stability and Security in Iraq: Report to Congress in Accordance with the Department of Defense Appropriations Act 2007 (Section 9010, Public Law 109-289)

    National Research Council Canada - National Science Library

    2006-01-01

    This report to Congress includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in Section 9010, DoD Defense Appropriations Act 2007...

  18. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  19. Feelings Count: Conceptualizing and Measuring Students' Happiness in Schools

    Science.gov (United States)

    Huebner, Scott

    2010-01-01

    The importance of positive subjective well-being (SWB) is supported by the wide-ranging network of relations between students' SWB and crucial school processes and outcomes, such as positive student engagement behavior, interpersonal relationships, coping skills, and academic achievement. Some studies have revealed that not only is positive SWB a…

  20. Objectively measured physical activity in Danish after-school cares

    DEFF Research Database (Denmark)

    Domazet, Sidsel Louise; Møller, Niels Christian; Støckel, Jan Toftegaard

    2015-01-01

    Inactivity and more sedentary time predominate the daily activity level of many of today's children. In Denmark, certified sport after-school cares have been established in order to increase children's daily physical activity (PA) level. This cross-sectional study aimed to investigate the activit...

  1. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  2. Development and Validity Testing of Belief Measurement Model in Buddhism for Junior High School Students at Chiang Rai Buddhist Scripture School: An Application for Multitrait-Multimethod Analysis

    Science.gov (United States)

    Chaidi, Thirachai; Damrongpanich, Sunthorapot

    2016-01-01

    The purposes of this study were to develop a model to measure the belief in Buddhism of junior high school students at Chiang Rai Buddhist Scripture School, and to determine construct validity of the model for measuring the belief in Buddhism by using Multitrait-Multimethod analysis. The samples were 590 junior high school students at Buddhist…

  3. Schools and Safety: Waiting for When

    Science.gov (United States)

    Ruder, Robert

    2012-01-01

    In response to violence against students and school personnel in the past decade, school districts have implemented an array of security measures designed to keep all the occupants of a school free from harm. Despite these safeguards, personnel continue to operate under the assumption that it's not a question of "if," it's a question of "when."…

  4. Examining the Psychometric Properties of the Turkish Version of the Parent School Climate Survey and Measuring of Parents’ Perceptions of School Climate by Gender

    OpenAIRE

    Bugay, Aslı; Avcı, Dilek; Özdemir, Selçuk

    2018-01-01

    The studyinvestigated the psychometric properties of the Turkish version of the ParentSchool Climate Survey. The survey was developed by Haynes, Emmons and Comer(1994) to measure the school adaptation and the quality of student-adultrelationship. The scale consists of eight sub-dimensions: academic focus,achievement motivation, attention and sensitivity of school director,collaborative decision-making, parent participation, school building,school-community relationship, and student-teacher re...

  5. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  6. Measurement error in income and schooling, and the bias of linear estimators

    DEFF Research Database (Denmark)

    Bingley, Paul; Martinello, Alessandro

    The characteristics of measurement error determine the bias of linear estimators. We propose a method for validating economic survey data allowing for measurement error in the validation source, and we apply this method by validating Survey of Health, Ageing and Retirement in Europe (SHARE) data...... with Danish administrative registers. We find that measurement error in surveys is classical for annual gross income but non-classical for years of schooling, causing a 21% amplification bias in IV estimators of returns to schooling. Using a 1958 Danish schooling reform, we contextualize our result...

  7. Using State-Wide Multiple Measures for School Leadership and Management: Costs Incurred vs. Benefits Gained

    Science.gov (United States)

    Hentschke, Guilbert; Wohlstetter, Priscilla; Hirman, Jennifer; Zeehandelaar, Dara

    2011-01-01

    In this article, we examine the utility and value of multiple measures of school performance for school leaders and managers. The research was conducted within the context of the state of California through an investigation of how operators, managers and authorisers of autonomous "charter" (publicly financed but privately operated)…

  8. Validity Evidence for the Measurement of the Strength of Motivation for Medical School

    Science.gov (United States)

    Kusurkar, Rashmi; Croiset, Gerda; Kruitwagen, Cas; ten Cate, Olle

    2011-01-01

    The Strength of Motivation for Medical School (SMMS) questionnaire is designed to determine the strength of motivation of students particularly for medical study. This research was performed to establish the validity evidence for measuring strength of motivation for medical school. Internal structure and relations to other variables were used as…

  9. Assessing drivers and barriers of energy-saving measures in Oklahoma’s public schools

    International Nuclear Information System (INIS)

    Castleberry, Becca; Gliedt, Travis; Greene, J. Scott

    2016-01-01

    Implementing energy conservation initiatives within public schools, including both behavioral changes as well as building retrofits, can generate cost saving and educational benefits. However, the level of energy efficiency improvements that can be achieved may depend on the socio-economic characteristics of the school or the underlying district. The purpose of this research is to identify and examine the factors that have a role in influencing the adoption of energy-saving practices and/or building retrofits within Oklahoma’s public schools. In order to investigate these factors, a survey was administered to public school administrators across the state. The results illustrate different factors that drive schools to make decisions associated with energy conservation and retrofitting efforts. A comparative analysis between different types of schools (e.g., rural vs. urban, low- vs. high-income) was also conducted to discover the combination of characteristics that are associated with energy-saving measures. The findings could help school administrators and teachers understand how they might adopt new behaviors or technologies. - Highlights: • Energy performance improvements depend on characteristics of a school district. • Districts with environmental science classes more likely to take energy measures. • Cost savings motivated energy measures in high-income/large-population districts. • A cluster analysis revealed geographic patterns of energy saving measures.

  10. Developing the School Physical Activity and Nutrition Environment Tool to Measure Qualities of the Obesogenic Context

    Science.gov (United States)

    John, Deborah H.; Gunter, Katherine; Jackson, Jennifer A.; Manore, Melinda

    2016-01-01

    Background: Practical tools are needed that reliably measure the complex physical activity (PA) and nutrition environments of elementary schools that influence children's health and learning behaviors for obesity prevention. The School Physical Activity and Nutrition-Environment Tool (SPAN-ET) was developed and beta tested in 6 rural Oregon…

  11. Dimensionality and Measurement Invariance of a School Readiness Screener by Gender and Parent Education Levels

    Science.gov (United States)

    Quirk, Matthew; Mayworm, Ashley; Furlong, Michael J.; Grimm, Ryan; Rebelez, Jennica

    2015-01-01

    This study examined the dimensionality and measurement invariance of the Kindergarten Student Entrance Profile (KSEP), a brief screening tool designed for use as a universal school readiness assessment. Teachers rated the readiness of 10,031 children during the first month of kindergarten in four ethnically diverse, medium-sized school districts…

  12. The Development and Evaluation of a Measure Assessing School Nurses' Perceived Barriers to Addressing Pediatric Obesity

    Science.gov (United States)

    Wu, Yelena P.; Steele, Ric G.

    2011-01-01

    School nurses represent an important resource for addressing pediatric obesity and weight-related health. However, school nurses perceive numerous barriers that prevent them from addressing the weight-related health of students. The current study developed and tested a new, comprehensive measure of nurses' perceptions of 10 types of barriers to…

  13. School Sun-Protection Policies: Measure Development and Assessments in 2 Regions of the United States

    Science.gov (United States)

    Reynolds, Kim D.; Buller, David B.; French, Simone A.; Buller, Mary K.; Ashley, Jeff L.

    2012-01-01

    Background: In 2002, the US Centers for Disease Control and Prevention recommended that schools adopt policies that reduce exposure of children to ultraviolet radiation to prevent skin cancer. We report here the development of a school sun-safety policy measure and baseline descriptive statistics from the assessment of written policies collected…

  14. Conceptual foundation for measures of physical function and behavioral health function for Social Security work disability evaluation.

    Science.gov (United States)

    Marfeo, Elizabeth E; Haley, Stephen M; Jette, Alan M; Eisen, Susan V; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Brandt, Diane E; Rasch, Elizabeth K

    2013-09-01

    Physical and mental impairments represent the 2 largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person's underlying capabilities as well as activity demands relevant to the context of work. The objective of this article is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, 2 content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability and Health as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies 5 major domains: (1) behavior control, (2) basic interactions, (3) temperament and personality, (4) adaptability, and (5) workplace behaviors. The content model describing physical functioning includes 3 domains: (1) changing and maintaining body position, (2) whole-body mobility, and (3) carrying, moving, and handling objects. These content models informed subsequent measurement properties including item development and measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  15. Continuous radon measurements in schools: time variations and related parameters

    International Nuclear Information System (INIS)

    Giovani, C.; Cappelletto, C.; Garavaglia, M.; Pividore, S.; Villalta, R.

    2004-01-01

    Some results are reported of observations made within a four-year survey, during different seasons and in different conditions of school building use. Natural radon variations (day-night cycles, seasonal and temperature dependent variations etc..) and artificial ones (opening of windows, weekends and vacations, deployment of air conditioning or heating systems. etc.) were investigated as parameters affecting time dependent radon concentrations. (P.A.)

  16. A Review and Comparative Analysis of Security Risks and Safety Measures of Mobile Health Apps

    Directory of Open Access Journals (Sweden)

    Karen Scott

    2015-11-01

    Full Text Available In line with a patient-centred model of healthcare, Mobile Health applications (mhealth apps provide convenient and equitable access to health and well-being resources and programs that can enable consumers to monitor their health related problems, understand specific medical conditions and attain personal fitness goals. This increase in access and control comes with an increase in risk and responsibility to identify and manage the associated risks, such as the privacy and security of consumers’ personal and health information. Based on a review of the literature, this paper identifies a set of risk and safety features for evaluating mHealth apps and uses those features to conduct a comparative analysis of the 20 most popular mHealth apps. The comparative analysis reveals that current mHealth apps do pose a risk to consumers. To address the safety and privacy concerns, recommendations to consumers and app developers are offered together with consideration of mHealth app future trends.

  17. Development of the school organisational health questionnaire: a measure for assessing teacher morale and school organisational climate.

    Science.gov (United States)

    Hart, P M; Wearing, A J; Conn, M; Carter, N L; Dingle, R K

    2000-06-01

    A growing body of empirical evidence suggests that organisational factors are more important than classroom specific issues in determining teacher morale. Accordingly, it is necessary to have available measures that accurately assess morale, as well as the organisational factors that are likely to underpin the experience of morale. Three studies were conducted with the aim of developing a psychometrically sound questionnaire that could be used to assess teacher morale and various dimensions of school organisational climate. A total of 1,520 teachers from 18 primary and 26 secondary schools in the Australian state of Victoria agreed to participate in three separate studies (N = 615, 342 and 563 in Studies 1, 2 and 3, respectively) that were used to develop the questionnaire. The demographic profile of the teachers was similar to that found in the Department as a whole. All teaching staff in the participating schools were asked to complete a self-report questionnaire as part of the evaluation of an organisational development programme. A series of exploratory and confirmatory factor analyses were used to establish the questionnaire's factor structure, and correlation analyses were used to examine the questionnaire's convergent and discriminant validity. The three studies resulted in the 54-item School Organisational Health Questionnaire that measures teacher morale and 11 separate dimensions of school organisational climate: appraisal and recognition, curriculum coordination, effective discipline policy, excessive work demands, goal congruence, participative decision-making, professional growth, professional interaction, role clarity, student orientation, and supportive leadership.

  18. International and internal migration measured from the School Census in England.

    Science.gov (United States)

    Simpson, Ludi; Marquis, Naomi; Jivraj, Stephen

    2010-01-01

    The School Census is the only regularly updated dataset covering almost all of the population of a specific age, which records changes of address along with ethnicity and some family economic circumstances. It can be used to measure internal and international family migration as shown in this report. The School Census is suited to identify and quantify new local migration streams between censuses, successfully identifying the local distribution of Eastern European immigration in the decade since 2000. The measures do not provide a complete measure of migration, either internally or internationally. The exclusion of those outside the state school system means that internal migration is under-estimated, and international migration is approximately measured. The advantages of the School Census are its frequent updates, its fine geographical information, and its indicators of ethnicity and low family income, which powerfully complement other sources.

  19. Rethinking Teacher Turnover: Longitudinal Measures of Instability in Schools

    Science.gov (United States)

    Holme, Jennifer Jellison; Jabbar, Huriya; Germain, Emily; Dinning, John

    2018-01-01

    While there is a robust literature examining the patterns and causes of teacher turnover, few articles to date have critically examined the measures of turnover used in these studies. Yet, an assessment of the way turnover is measured is important, as the measures become the means by which the "problem" of turnover becomes defined and…

  20. School Principals' Leadership Skills: Measurement Equivalence across Cultures

    Science.gov (United States)

    Da'as, Rima'a

    2017-01-01

    Despite substantial interest and research in measuring leader's skills, little is known about the measurement equivalence and mean differences in the scores measuring principals' skills (cognitive, interpersonal, strategic) across cultures (collectivism versus individualism). The aim of the present study was to assess measurement…

  1. Measures for security and supervision of pipelines; Massnahmen zur Pipeline-Sicherheit und -Ueberwachung

    Energy Technology Data Exchange (ETDEWEB)

    Horlacher, Hans-Burkhard [TU Dresden (Germany). Inst. fuer Wasserbau und Technische Hydromechanik; Giesecke, Juergen [Stuttgart Univ. (Germany). Inst. fuer Wasserbau

    2010-07-01

    In a previous publication, the two authors dealt with the hydraulic problems as regards mineral oil pipelines. The present report describes the measures mainly used to guarantee the safety of such pipelines. (orig.)

  2. PREVENTIVE MEASURES - EXCEPTION TO THE PRINCIPLE OF THE RIGHT TO LIBERTY AND SECURITY

    Directory of Open Access Journals (Sweden)

    Marin-Alin DĂNILĂ

    2016-05-01

    Full Text Available Considering the specific obligations arising from the exercise of criminal action and civil action in criminal proceedings and taking into account the need to ensure a better conduct of activities that are undertaken in solving criminal cases, it sometimes appears necessary, taking certain procedural measures. Procedural measures were defined [1] as institutions available for criminal procedural law and criminal judicial bodies consisting of privations or certain constraints, real or personal, of the conditions and circumstances under which the criminal proceedings are being realized. By the function pursued by the legislature, these measures work as a legal means of prevention or suppression of circumstances or situations likely to jeopardize the effectiveness of the criminal proceedings through the obstacles, difficulties and confusion which they can produce [2]. Procedural measures arise as opportunities, but not being specific to any criminal case, judicial bodies take measures according to the specific circumstances of each criminal case. From this derives the adjacent character of the criminal procedural measures to the main job [3].

  3. Study of coercive measures in prisons and secure psychiatric hospitals: the views of inmates and caregivers

    Directory of Open Access Journals (Sweden)

    A. Runte-Geidel

    2014-06-01

    Full Text Available Aim: The aim of the study was to ascertain the opinions of both inmates and staff of prison establishments about the use of coercive measures justified for clinical reasons for people with mental health problems and about the need to create protocols to regulate the application of these measures. Method: These opinions were gathered in a Qualitative Study with Focus Groups (prison inmates and prison staff from the Granada Penitentiary Centre and the Alicante Penitentiary Psychiatric Hospital, both in Spain. Results: The results showed that forced medication is the most commonly used coercive measure in these institutions. The inmates did not understand and rejected the use of this measure, above all because they were poorly informed about their illness and the medication required to treat it. The staff however defended the benefits of psychiatric medicine, even when administered without the patient's consent. Conclusions: Both inmates and staff agreed that it would be useful to have a protocol regulating the use of coercive measures. The study has also identified a number of important factors that could help to reduce the need for coercive measures or make their use unnecessary.

  4. Large-scale CO2 measurement campaigns in Danish schools

    DEFF Research Database (Denmark)

    Clausen, Geo; Toftum, Jørn; Bekö, Gabriel

    2016-01-01

    In two large measurement campaigns performed in 2009 and 2014 more than 1500 spot measurements of CO2 were made by pupils in Danish primary school classes. In 2009 56% of the measurements exceeded the recommended value of 1000 ppm CO2. This percentage had increased to 60% in 2014. Changing the be...

  5. Measuring Promotion and Prevention Orientations of Secondary School Students: It Is More Than Meets the Eye

    Science.gov (United States)

    Hodis, Flaviu A.; Hattie, John A. C.; Hodis, Georgeta M.

    2016-01-01

    The General Regulatory Focus Measure has been used extensively in psychological research to gauge promotion and prevention orientations. Findings of this research show that for New Zealand secondary school students, the General Regulatory Focus Measure does not measure promotion and prevention as theoretically independent constructs.

  6. Nuclear reactors and fuel storage pools security in France and in Belgium, and the associated reinforcement measures. Press kit

    International Nuclear Information System (INIS)

    Besnard, Manon; Marignac, Yves; Boilley, David; MacKerron, Gordon; Becker, Oda; Lyman, Ed; Zerbib, Jean-Claude; Sotty, Meryl

    2017-10-01

    security systematically oppose any attempt to clarify the state of protection of nuclear facilities against malevolent acts with the argument of 'defence secrecy'. This generalised reliance on secrecy is a formidable trap, for two major reasons. First, it places any observer in an impossible bind by default: working on the basis of public information but in principle completely uninformed of the degree of vulnerability determined by the authorities and any related protection measures (since this information is confidential), the observer is still expected to identify the point at which highlighting and analysing this public information would compromise secrecy and therefore security. Above all, in the event that security vulnerabilities exist at nuclear facilities, and that current action by industrial operators and public authorities aims to hide such flaws for the sake of secrecy, rather than making the necessary reinforcements, how can this problem be addressed without weakening the system under the microscope? It is essential, from the point of view of democratic principles as well as public security, that secrecy in no way be a screen for the authorities to hide such flaws instead of protecting the facilities effectively. This concern is at the heart of the work commissioned by Greenpeace France. This work looks at the current security situation at nuclear facilities and, more specifically, at spent fuel pools at nuclear plants (in France and Belgium) and at the La Hague reprocessing plant (in France). This work was accompanied by very special precautions. The most obvious measure is to release only this summary to the public. Greenpeace will ensure the report is released to only a handful of its members working on the issue and to the relevant authorities in European countries concerned (France, Germany, Belgium, Luxembourg and Switzerland). It should be noted that these precautions are not a reflection of the nature of the information used in the report. This

  7. Teen Dating Violence, Sexual Harassment, and Bullying Among Middle School Youth: Examining Measurement Invariance by Gender.

    Science.gov (United States)

    Cutbush, Stacey; Williams, Jason

    2016-12-01

    This study investigated measurement invariance by gender among commonly used teen dating violence (TDV), sexual harassment, and bullying measures. Data were collected from one cohort of seventh-grade middle school students (N = 754) from four schools. Using structural equation modeling, exploratory and confirmatory factor analyses assessed measurement models and tested measurement invariance by gender for aggression measures. Analyses invoked baseline data only. Physical and psychological TDV perpetration measures achieved strict measurement invariance, while bullying perpetration demonstrated partial strict invariance. Electronic TDV and sexual harassment perpetration achieved metric/scalar invariance. Study findings lend validation to prior and future studies using these measures with similar populations. Future research should increase attention to measurement development, refinement, and testing among study measures. © 2016 The Authors. Journal of Research on Adolescence © 2016 Society for Research on Adolescence.

  8. Development and initial validation of a measure of work, family, and school conflict.

    Science.gov (United States)

    Olson, Kristine J

    2014-01-01

    This study reports the development and initial validation of a theoretically based measure of conflict between work, family, and college student roles. The measure was developed through the assessment of construct definitions and an assessment of measurement items by subject matter experts. Then, the measurement items were assessed with data from 500 college students who were engaged in work and family responsibilities. The results indicate that conflict between work, family, and school are effectively measured by 12 factors assessing the direction of conflict (e.g., work-to-school conflict, and school-to-work conflict) as well as the form of conflict (i.e., time, strain, and behavior based conflict). Sets of exploratory and confirmatory factor analyses demonstrated that the 12 factors of the new measure are distinct from the 6 factors of the Carlson, Kacmar, and Williams (2000) work-family conflict measure. Criterion validity of the measure was established through a series of regression analyses testing hypothesized relationships between antecedent and outcome variables with role conflict. Results indicate that role demand was a robust predictor of role conflict. To extend the literature, core self-evaluations and emotional stability were established as predictors of role conflict. Further, work, family, and school role satisfaction were significantly impacted with the presence of role conflict between work, family, and school. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  9. Objectively Measured School Day Physical Activity Among Elementary Students in the United States and Finland.

    Science.gov (United States)

    Yli-Piipari, Sami; Kulmala, Janne Santeri; Jaakkola, Timo; Hakonen, Harto; Fish, Joseph Cole; Tammelin, Tuija

    2016-04-01

    Schools are in a unique position to ensure that all students meet the current physical activity (PA) recommendations. This study aimed to examine 1st to 3rd grade elementary students' accelerometer measured school day PA in the United States (U.S.) and Finland. The sample consisted of 200 students (107 girls, 93 boys; ages 6 to 8) and their school day PA was monitored with hip-worn ActiGraph GT3X+ accelerometers across a 5-day school week and the thresholds 100 and 2296 count per minute were used to separate sedentary time, light PA, and moderate-to-vigorous PA (MVPA). On an average school day, students were engaged in MVPA for 20.0 min in the U.S. and 24.1 min in Finland. Students' school-day MVPA was 9 to 16 minutes higher during physical education (PE) days compared with non-PE days (U.S: 25.8 vs. 16.6 min/day; Finland: 36.3 vs. 20.1 min/day). Girls had less MVPA and more sedentary time compared with boys in both samples. This study highlights both the role of PE and other school day physical activities in meeting PA guidelines. Policy measures are needed to change the structure of the school day and enhance PA to ensure that students meet the PA recommendations.

  10. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  11. Generation and mid-IR measurement of a gas-phase to predict security parameters of aviation jet fuel.

    Science.gov (United States)

    Gómez-Carracedo, M P; Andrade, J M; Calviño, M A; Prada, D; Fernández, E; Muniategui, S

    2003-07-27

    The worldwide use of kerosene as aviation jet fuel makes its safety considerations of most importance not only for aircraft security but for the workers' health (chronic and/or acute exposure). As most kerosene risks come from its vapours, this work focuses on predicting seven characteristics (flash point, freezing point, % of aromatics and four distillation points) which assess its potential hazards. Two experimental devices were implemented in order to, first, generate a kerosene vapour phase and, then, to measure its mid-IR spectrum. All the working conditions required to generate the gas phase were optimised either in a univariate or a multivariate (SIMPLEX) approach. Next, multivariate prediction models were deployed using partial least squares regression and it was found that both the average prediction errors and precision parameters were satisfactory, almost always well below the reference figures.

  12. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  13. Measuring the Effect of Using Simulated Security Awareness Training and Testing on Members of Virtual Communities of Practice

    Directory of Open Access Journals (Sweden)

    Craig L. Tidwell

    2010-12-01

    Full Text Available Information security (Infosec has become a major challenge for all private and public organizations. The protecting of proprietary and secret data and the proper awareness of what is entailed in protecting this data is necessary in all organizations. How does simulation and training influence virtual communities of practice information security awareness over time and with a variety of security scenarios. Can members of a virtual community be significantly changed in how they respond to routine security processes and attempts to breach security or violate the security policy of their organization? How does deterrence play a role in this prevention and education? A study is planned that will train and test users of a virtual community of practice over a 3 month period of time, via a web interface, and using simulated events, to see if the planned security awareness training will be effective in changing their responses to the events and further testing.

  14. Measurement Properties of Psychosocial and Environmental Measures Associated with Fruit and Vegetable Intake among Middle School Adolescents

    Science.gov (United States)

    Granner, Michelle L.; Evans, Alexandra E.

    2012-01-01

    Objective: To assess the measurement properties of several scales modified or created to assess factors related to fruit and vegetable intake within a young adolescent population. Design: Cross-sectional with data collected via self-report. Setting: Data were collected in regularly scheduled classes in the school setting. Participants: African…

  15. Subjective sleepiness and sleep quality in adolescents are related to objective and subjective measures of school performance

    NARCIS (Netherlands)

    Boschloo, Annemarie; Krabbendam, Lydia; Dekker, Sanne; Lee, Nikki; De Groot, Renate; Jolles, Jelle

    2016-01-01

    This study investigated the relation between sleep and school performance in a large sample of 561 adolescents aged 11–18 years. Three subjective measures of sleep were used: sleepiness, sleep quality, and sleep duration. They were compared to three measures of school performance: objective school

  16. Subjective sleepiness and sleep quality in adolescents are related to objective and subjective measures of school performance

    NARCIS (Netherlands)

    Boschloo, Annemarie; Krabbendam, Lydia; Dekker, Sanne; Lee, Nikki; De Groot, Renate; Jolles, Jelle

    2018-01-01

    This study investigated the relation between sleep and school performance in a large sam- ple of 561 adolescents aged 11–18 years. Three subjective measures of sleep were used: sleepiness, sleep quality, and sleep duration. They were compared to three measures of school performance: objective school

  17. Subjective Sleepiness and Sleep Quality in Adolescents are Related to Objective and Subjective Measures of School Performance.

    NARCIS (Netherlands)

    Boschloo, A.; Krabbendam, L.; Dekker, S.; Lee, N.; Groot, R. de; Jolles, J.

    2013-01-01

    This study investigated the relation between sleep and school performance in a large sample of 561 adolescents aged 11-18 years. Three subjective measures of sleep were used: sleepiness, sleep quality, and sleep duration. They were compared to three measures of school performance: objective school

  18. Developing a Measure of Traffic Calming Associated with Elementary School Students’ Active Transport

    Science.gov (United States)

    Nicholson, Lisa M.; Turner, Lindsey; Slater, Sandy J.; Abuzayd, Haytham; Chriqui, Jamie F.; Chaloupka, Frank

    2014-01-01

    The objective of this study is to develop a measure of traffic calming with nationally available GIS data from NAVTEQ and to validate the traffic calming index with the percentage of children reported by school administrators as walking or biking to school, using data from a nationally representative sample of elementary schools in 2006-2010. Specific models, with and without correlated errors, examined associations of objective GIS measures of the built environment, nationally available from NAVTEQ, with the latent construct of traffic calming. The best fit model for the latent traffic calming construct was determined to be a five factor model including objective measures of intersection density, count of medians/dividers, count of low mobility streets, count of roundabouts, and count of on-street parking availability, with no correlated errors among items. This construct also proved to be a good fit for the full measurement model when the outcome measure of percentage of students walking or biking to school was added to the model. The traffic calming measure was strongly, significantly, and positively correlated with the percentage of students reported as walking or biking to school. Applicability of results to public health and transportation policies and practices are discussed. PMID:25506255

  19. Developing a Measure of Traffic Calming Associated with Elementary School Students' Active Transport.

    Science.gov (United States)

    Nicholson, Lisa M; Turner, Lindsey; Slater, Sandy J; Abuzayd, Haytham; Chriqui, Jamie F; Chaloupka, Frank

    2014-12-01

    The objective of this study is to develop a measure of traffic calming with nationally available GIS data from NAVTEQ and to validate the traffic calming index with the percentage of children reported by school administrators as walking or biking to school, using data from a nationally representative sample of elementary schools in 2006-2010. Specific models, with and without correlated errors, examined associations of objective GIS measures of the built environment, nationally available from NAVTEQ, with the latent construct of traffic calming. The best fit model for the latent traffic calming construct was determined to be a five factor model including objective measures of intersection density, count of medians/dividers, count of low mobility streets, count of roundabouts, and count of on-street parking availability, with no correlated errors among items. This construct also proved to be a good fit for the full measurement model when the outcome measure of percentage of students walking or biking to school was added to the model. The traffic calming measure was strongly, significantly, and positively correlated with the percentage of students reported as walking or biking to school. Applicability of results to public health and transportation policies and practices are discussed.

  20. Measurements of the solar UVR protection provided by shade structures in New Zealand primary schools.

    Science.gov (United States)

    Gies, Peter; Mackay, Christina

    2004-01-01

    To reduce ultraviolet radiation (UVR) exposure during childhood, shade structures are being erected in primary schools to provide areas where children can more safely undertake outdoor activities. This study to evaluate the effectiveness of existing and purpose built shade structures in providing solar UVR protection was carried out on 29 such structures in 10 schools in New Zealand. Measurements of the direct and scattered solar UVR doses within the central region of the shade structures were made during the school lunch break period using UVR-sensitive polysulfone film badges. These measurements indicate that many of the structures had UVR protection factors (PF) of 4-8, which was sufficient to provide protection during the school lunch hour. However, of the 29 structures examined, only six would meet the suggested requirements of UVR PF greater than 15 required to provide all-day protection.

  1. How do medical schools use measurement systems to track faculty activity and productivity in teaching?

    Science.gov (United States)

    Mallon, William T; Jones, Robert F

    2002-02-01

    The authors describe their findings from a study that (1) identified 41 medical schools or medical school departments that used metric systems to quantify faculty activity and productivity in teaching and (2) analyzed the purposes and progress of those systems. Among the reasons articulated for developing these systems, the most common was to identify a "rational" method for distributing funds to departments. More generally, institutions wanted to emphasize the importance of the school's educational mission. The schools varied in the types of information they tracked, ranging from a selective focus on medical school education to a comprehensive assessment of teaching activity and educational administration, committee work, and advising. Schools were almost evenly split between those that used a relative-value-unit method of tracking activity and those that used a contact-hour method. This study also identified six challenges that the institutions encountered with these metric systems: (1) the lack of a culture of data in management; (2) skepticism of faculty and chairs; (3) the misguided search for one perfect metric; (4) the expectation that a metric system will erase ambiguity regarding faculty teaching contributions; (5) the lack of, and difficulty with developing, measures of quality; and (6) the tendency to become overly complex. Because of the concern about the teaching mission at medical schools, the number of institutions developing educational metric systems will likely increase in the coming years. By documenting and accounting financially for teaching, medical schools can ensure that the educational mission is valued and appropriately supported.

  2. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  3. The School Store...Making It Work. Second Edition. Selling, Buying, Promotion, Operation, Store Security, Management, Accounting.

    Science.gov (United States)

    Michigan State Univ., East Lansing. Michigan Vocational Education Resource Center.

    This handbook is intended as a resource for individuals involved in the development, operation, and expansion of school store laboratories. The first of three sections covers facility/laboratory planning. It includes detailed guidelines for establishing a new school store operation and remodeling or relocating an existing operation. Section II…

  4. A City and National Metric measuring Isolation from the Global Market for Food Security Assessment

    Science.gov (United States)

    Brown, Molly E.; Silver, Kirk Coleman; Rajagopalan, Krishnan

    2013-01-01

    The World Bank has invested in infrastructure in developing countries for decades. This investment aims to reduce the isolation of markets, reducing both seasonality and variability in food availability and food prices. Here we combine city market price data, global distance to port, and country infrastructure data to create a new Isolation Index for countries and cities around the world. Our index quantifies the isolation of a city from the global market. We demonstrate that an index built at the country level can be applied at a sub-national level to quantify city isolation. In doing so, we offer policy makers with an alternative metric to assess food insecurity. We compare our isolation index with other indices and economic data found in the literature.We show that our Index measures economic isolation regardless of economic stability using correlation and analysis

  5. An analysis of strategic performance measures of companies listed on the JSE securities exchange South Africa

    Directory of Open Access Journals (Sweden)

    JHvH de Wet

    2014-07-01

    Full Text Available This study highlights the importance of economic profits (EVA and their long-term effects on shareholder value (MVA. South African companies listed on the JSE were analysed and it is evident that the relative measure of internal performance (spreads can be used to rank companies in terms of value creation. Individual companies and sectors were also placed on a financial strategy matrix, which evaluated companies according to spreads and cash management. The sales growth less the SGR percentage, was used to indicate cash management. Statistical tests (regression analysis were done on the data to test the validity of the financial strategy matrix model. The results showed that there is a positive relationship between spreads and shareholder value, but sales growth less the sustainable growth rate does not contribute significantly to shareholder value.

  6. High-resolution measurements of face-to-face contact patterns in a primary school.

    Directory of Open Access Journals (Sweden)

    Juliette Stehlé

    Full Text Available BACKGROUND: Little quantitative information is available on the mixing patterns of children in school environments. Describing and understanding contacts between children at school would help quantify the transmission opportunities of respiratory infections and identify situations within schools where the risk of transmission is higher. We report on measurements carried out in a French school (6-12 years children, where we collected data on the time-resolved face-to-face proximity of children and teachers using a proximity-sensing infrastructure based on radio frequency identification devices. METHODS AND FINDINGS: Data on face-to-face interactions were collected on Thursday, October 1(st and Friday, October 2(nd 2009. We recorded 77,602 contact events between 242 individuals (232 children and 10 teachers. In this setting, each child has on average 323 contacts per day with 47 other children, leading to an average daily interaction time of 176 minutes. Most contacts are brief, but long contacts are also observed. Contacts occur mostly within each class, and each child spends on average three times more time in contact with classmates than with children of other classes. We describe the temporal evolution of the contact network and the trajectories followed by the children in the school, which constrain the contact patterns. We determine an exposure matrix aimed at informing mathematical models. This matrix exhibits a class and age structure which is very different from the homogeneous mixing hypothesis. CONCLUSIONS: We report on important properties of the contact patterns between school children that are relevant for modeling the propagation of diseases and for evaluating control measures. We discuss public health implications related to the management of schools in case of epidemics and pandemics. Our results can help define a prioritization of control measures based on preventive measures, case isolation, classes and school closures, that

  7. Essential Measures for Student Success: Implementing Cooperation, Collaboration, and Coordination between Schools and Parents

    Science.gov (United States)

    Kirby, Edwena

    2012-01-01

    This book unveils "essential measures" that create a revitalized educational system of which educators and parents can use to promote student success. When these measures are applied properly, the benefits include, eradicating student fear, elevating student motivation, improving school attendance, and reducing student dropout rates. These…

  8. On the Validity of Working Memory Measures for Elementary School Children.

    Science.gov (United States)

    Morra, Sergio; Scopesi, Alda

    The literature on the measurement of working memory is discussed, with emphasis on the validity of such measurement with elementary school students. Approaches by J. Pascual-Leone, R. Case, A. D. Baddeley, and C. Hulme are considered. An experimental study is presented, in which 100 boys and 91 girls (aged from 6 years to 10 years 11 months) were…

  9. Validation of the Elementary Social Behavior Assessment: A Measure of Student Prosocial School Behaviors

    Science.gov (United States)

    Pennefather, Jordan T.; Smolkowski, Keith

    2015-01-01

    We describe the psychometric evaluation of the "Elementary Social Behavior Assessment" (ESBA™), a 12-item scale measuring teacher-preferred, positive social skills. The ESBA was developed for use in elementary school classrooms to measure teacher perceptions of students using time-efficient, web-based data collection methods that allow…

  10. The Measurement of Students' Achievement in Teaching Primary School Fifth Year Mathematics Classes

    Science.gov (United States)

    Doganay, Ahmet; Bal, Ayten Pinar

    2010-01-01

    The aim of this study was to investigate students' and teachers' point of views about preparing measurement tools used in mathematics classes, the level of learning that these tools are intended to measure, how often they are used and how they are scored in terms of assessing 5th grade primary school mathematic courses. The population of the study…

  11. The Development of Instruments to Measure Motivational Interviewing Skill Acquisition for School-Based Personnel

    Science.gov (United States)

    Small, Jason W.; Lee, Jon; Frey, Andy J.; Seeley, John R.; Walker, Hill M.

    2014-01-01

    As specialized instructional support personnel begin learning and using motivational interviewing (MI) techniques in school-based settings, there is growing need for context-specific measures to assess initial MI skill development. In this article, we describe the iterative development and preliminary evaluation of two measures of MI skill adapted…

  12. Three Scales to Measure Burnout of Primary School Teachers: Empirical Evidence on Their Adequacy

    Science.gov (United States)

    Platsidou, Maria; Daniilidou, Athena

    2016-01-01

    This study aimed at comparing the psychometric properties of three measures of burnout administered in 320 Greek primary school teachers, namely the Maslach Burnout Inventory (Maslach and Jackson 1982), the Burnout Measure (Pines and Aronson 1988) and the Copenhagen Burnout Inventory (Kristensen et al. 2005). Confirmatory factor analysis tested a…

  13. Does the EDI Measure School Readiness in the Same Way across Different Groups of Children?

    Science.gov (United States)

    Guhn, Martin; Gadermann, Anne; Zumbo, Bruno D.

    2007-01-01

    The present study investigates whether the Early Development Instrument (Offord & Janus, 1999) measures school readiness similarly across different groups of children. We employ ordinal logistic regression to investigate differential item functioning, a method of examining measurement bias. For 40,000 children, our analysis compares groups…

  14. Measuring University Students' Perceived Self-Efficacy in Science Communication in Middle and High Schools

    Science.gov (United States)

    Chi, Shaohui; Liu, Xiufeng; Gardella, Joseph A.

    2016-01-01

    Service learning typically involves university students in teaching and learning activities for middle and high school students, however, measurement of university students' self-efficacy in science communication is still lacking. In this study, an instrument to measure university students' perceived self-efficacy in communicating science to…

  15. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  16. Chinese Middle School Teachers' Preferences Regarding Performance Evaluation Measures

    Science.gov (United States)

    Liu, Shujie; Xu, Xianxuan; Stronge, James H.

    2016-01-01

    Teacher performance evaluation currently is receiving unprecedented attention from policy makers, scholars, and practitioners worldwide. This study is one of the few studies of teacher perceptions regarding teacher performance measures that focus on China. We employed a quantitative dominant mixed research design to investigate Chinese teachers'…

  17. Two Approaches to Measuring Task Interdependence in Elementary Schools.

    Science.gov (United States)

    Charters, W. W., Jr.

    This report compares two approaches to measuring task interdependence, a theoretically fruitful concept for analyzing an organization's technical system. Task interdependence exists among operating personnel in the degree that task performance of one operative constrains, augments, or otherwise poses contingencies for the performance of another.…

  18. Integrating Multi-Sensor Remote Sensing and In-situ Measurements for Africa Drought Monitoring and Food Security Assessment

    Science.gov (United States)

    Hao, X.; Qu, J. J.; Motha, R. P.; Stefanski, R.; Malherbe, J.

    2015-12-01

    Drought is one of the most complicated natural hazards, and causes serious environmental, economic and social consequences. Agricultural production systems, which are highly susceptible to weather and climate extremes, are often the first and most vulnerable sector to be affected by drought events. In Africa, crop yield potential and grazing quality are already nearing their limit of temperature sensitivity, and, rapid population growth and frequent drought episodes pose serious complications for food security. It is critical to promote sustainable agriculture development in Africa under conditions of climate extremes. Soil moisture is one of the most important indicators for agriculture drought, and is a fundamentally critical parameter for decision support in crop management, including planting, water use efficiency and irrigation. While very significant technological advances have been introduced for remote sensing of surface soil moisture from space, in-situ measurements are still critical for calibration and validation of soil moisture estimation algorithms. For operational applications, synergistic collaboration is needed to integrate measurements from different sensors at different spatial and temporal scales. In this presentation, a collaborative effort is demonstrated for drought monitoring in Africa, supported and coordinated by WMO, including surface soil moisture and crop status monitoring. In-situ measurements of soil moisture, precipitation and temperature at selected sites are provided by local partners in Africa. Measurements from the Soil Moisture and Ocean Salinity (SMOS) and the Moderate Resolution Imaging Spectroradiometer (MODIS) are integrated with in-situ observations to derive surface soil moisture at high spatial resolution. Crop status is estimated through temporal analysis of current and historical MODIS measurements. Integrated analysis of soil moisture data and crop status provides both in-depth understanding of drought conditions and

  19. Determining the Measurement Quality of a Montessori High School Teacher Evaluation Survey

    Directory of Open Access Journals (Sweden)

    Anthony Philip Setari

    2017-05-01

    Full Text Available The purpose of this study was to conduct a psychometric validation of a course evaluation instrument, known as a student evaluation of teaching (SET, implemented in a Montessori high school. The authors demonstrate to the Montessori community how to rigorously examine the measurement and assessment quality of instruments used within Montessori schools. The Montessori high school community needs an SET that has been rigorously examined for measurement issues. The examined SET was developed by a Montessori high school, and the sample data were collected from Montessori high school students. Using a Rasch partial credit model, the results of the analysis identified several measurement issues, including multidimensionality, misfit items, and inappropriate item difficulty levels. A revised version of the SET underwent the same analysis procedure, and the results indicated that measurement issues persisted. The authors suggest several ways to improve the overall measurement quality of the instrument while keeping the Montessori foundation. Additional validation studies with a revised version of the SET will be needed before the instrument can be endorsed for full implementation in a Montessori setting.

  20. The Journal of the Naval Postgraduate School Center for Homeland Defense and Security. Volume 6. Issue 3

    Science.gov (United States)

    2010-09-01

    genetic relationships between kin.33 Regardless of the underlying mechanism, individual symbiotic relationships can confer multiple benefits to the...allocation guidelines for homeland security and emergency management policymakers. The framework provides an operationally relevant rubric for...S. Wells, The Journey of Man: A Genetic Odyssey (Princeton, NJ: Princeton University Press, 2002). 4 A. Jakubowicz, “Anglo-multiculturalism

  1. A gender-based analysis of high school athletes using computerized electrocardiogram measurements.

    Directory of Open Access Journals (Sweden)

    Nikhil Kumar

    Full Text Available BACKGROUND: The addition of the ECG to the preparticipation examination (PPE of high school athletes has been a topic for debate. Defining the difference between the high school male and female ECG is crucial to help initiate its implementation in the High School PPE. Establishing the different parameters set for the male and female ECG would help to reduce false positives. We examined the effect of gender on the high school athlete ECG by obtaining and analyzing ECG measurements of high school athletes from Henry M. Gunn High School. METHODS: In 2011 and 2012, computerized Electrocardiograms were recorded and analyzed on 181 athletes (52.5% male; mean age 16.1 ± 1.1 years who participated in 17 different sports. ECG statistics included intervals and durations in all 3 axes (X, Y, Z to calculate 12 lead voltage sums, QRS Amplitude, QT interval, QRS Duration, and the sum of the R wave in V5 and the S Wave in V2 (RS Sum. RESULTS: By computer analysis, we demonstrated that male athletes had significantly greater QRS duration, Q-wave duration, and T wave amplitude. (P<0.05. By contrast, female athletes had a significantly greater QTc interval. (P<0.05. CONCLUSION: The differences in ECG measurements in high school athletes are strongly associated with gender. However, body size does not correlate with the aforementioned ECG measurements. Our tables of the gender-specific parameters can help facilitate the development of a more large scale and in-depth ECG analysis for screening high school athletes in the future.

  2. Associations between active commuting to school and objectively measured physical activity

    DEFF Research Database (Denmark)

    Børrestad L, Anita Bjørkelund; Ostergaard, Lars; Andersen, Lars Bo

    2013-01-01

    , b) compare moderate vigorous physical activity (MVPA) among children cycling vs. walking to school, and c) thus calculate possible underestimated MVPA, when using accelerometers to measure commuter cycling. Methods: A total of 78 children, average age 11.4 (SD = 0.5), participated in the study....... Physical activity was measured with cycle computers and accelerometers for 4 days. Mode of commuting and demographic information was self-reported in a questionnaire. Results: Children who reported to cycle to school spent significantly more time cycling than those who walked to school, 53.6 (SD = ± 33......Background: To provide more accurate assessment of commuting behavior and potential health effect, it is important to have accurate methods. Therefore, the current study aimed to a) compare questionnaire reported mode of commuting with objectively measured data from accelerometer and cycle computer...

  3. From IDs to Ice Cream to "I, Claudius": Security Is in the Cards at Cleveland Hill Union Free School District.

    Science.gov (United States)

    Passmore, Cheryl

    2002-01-01

    Describes the use of plastic identity badges with photographs and barcodes issued to all administrators, teachers, staff members, and students in grades 6-12 at the Cleveland Hill Union Free School District in Cheektowaga, New York. (PKP)

  4. 'How I Feel About My School': The construction and validation of a measure of wellbeing at school for primary school children.

    Science.gov (United States)

    Allen, Kate; Marlow, Ruth; Edwards, Vanessa; Parker, Claire; Rodgers, Lauren; Ukoumunne, Obioha C; Seem, Edward Chan; Hayes, Rachel; Price, Anna; Ford, Tamsin

    2018-01-01

    There is a growing focus on child wellbeing and happiness in schools, but we lack self-report measures for very young children. Three samples ( N = 2345) were combined to assess the psychometric properties of the How I Feel About My School (HIFAMS) questionnaire, which was designed for children aged 4-8 years. Test-retest reliability was moderate (intraclass correlation coefficient = .62). HIFAMS assessed a single concept and had moderate internal consistency (Cronbach's alpha values from .62 to .67). There were low correlations between scores on the child-reported HIFAMS and parent and teacher reports. Children at risk of exclusion had significantly lower HIFAMS scores than the community sample (mean difference = 2.4; 95% confidence interval (CI) = [1.6, 3.2]; p < .001). Schools contributed only 4.5% of the variability in HIFAMS score, the remaining 95.5% reflecting pupil differences within schools. Girls' scores were 0.37 units (95% CI = [0.16, 0.57]; p < .001) higher than boys, while year group and deprivation did not predict HIFAMS score. HIFAMS is a promising measure that demonstrates moderate reliability and discriminates between groups even among very young children.

  5. Private Schools

    Data.gov (United States)

    Department of Homeland Security — This Private Schools feature dataset is composed of all Private elementary and secondary education features in the United States as defined by the Private School...

  6. GIS measured environmental correlates of active school transport: A systematic review of 14 studies

    Directory of Open Access Journals (Sweden)

    Faulkner Guy

    2011-05-01

    Full Text Available Abstract Background Emerging frameworks to examine active school transportation (AST commonly emphasize the built environment (BE as having an influence on travel mode decisions. Objective measures of BE attributes have been recommended for advancing knowledge about the influence of the BE on school travel mode choice. An updated systematic review on the relationships between GIS-measured BE attributes and AST is required to inform future research in this area. The objectives of this review are: i to examine and summarize the relationships between objectively measured BE features and AST in children and adolescents and ii to critically discuss GIS methodologies used in this context. Methods Six electronic databases, and websites were systematically searched, and reference lists were searched and screened to identify studies examining AST in students aged five to 18 and reporting GIS as an environmental measurement tool. Fourteen cross-sectional studies were identified. The analyses were classified in terms of density, diversity, and design and further differentiated by the measures used or environmental condition examined. Results Only distance was consistently found to be negatively associated with AST. Consistent findings of positive or negative associations were not found for land use mix, residential density, and intersection density. Potential modifiers of any relationship between these attributes and AST included age, school travel mode, route direction (e.g., to/from school, and trip-end (home or school. Methodological limitations included inconsistencies in geocoding, selection of study sites, buffer methods and the shape of zones (Modifiable Areal Unit Problem [MAUP], the quality of road and pedestrian infrastructure data, and school route estimation. Conclusions The inconsistent use of spatial concepts limits the ability to draw conclusions about the relationship between objectively measured environmental attributes and AST. Future

  7. Measuring the Effectiveness of Information Security Training: A Comparative Analysis of Computer-Based Training and Instructor-Based Training

    Science.gov (United States)

    Kim, Philip

    2010-01-01

    Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…

  8. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    Science.gov (United States)

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  9. Measurement procedure to assess exposure to extremely low-frequency fields: A primary school case study

    International Nuclear Information System (INIS)

    Alonso, A.; Bahillo, A.; De la Rosa, R.; Carrera, A.; Duran, R. J.; Fernandez, P.

    2012-01-01

    How to correctly measure the exposure of general public to extremely low-frequency (ELF) radiation is a key issue for ELF epidemiological studies. This paper proposes a measurement procedure to accurately assess the exposure of people to electric and magnetic field in the frequency band from 5 Hz to 100 kHz in buildings and their premises. As ELF radiation could be particularly harmful to children, the measurement procedure is focused on exposure to ELF in schools. Thus, the students' exposure to ELF fields can be assessed by correlating the ELF measurements to the hours of school activity. In this paper, the measurement protocol was applied to study the ELF exposure on students from Garcia Quintana primary school in Valladolid, Spain. The campaign of measurements for ELF exposure assessment in this primary school was of great interest for the Regional Council of Public Health because of the social alarm generated by the presence of a significant number cancer cases in children. (authors)

  10. Knowledge, attitudes, and first-aid measures about epilepsy among primary school teachers in northern Iran.

    Science.gov (United States)

    Kolahi, A-A; Ghorbanpur-Valukolaei, M; Abbasi-Kangevari, M; Farsar, A-R

    2018-07-01

    To assess knowledge, attitudes, and first-aid measures about epilepsy among primary school teachers. This cross-sectional study was conducted with participation of 342 primary school teachers during September 2016 to January 2017 in cities of Babol and Qaem-Shahr in Mazandaran Province in northern Iran. Primary schools were selected using simple random sampling. Data were collected through interviews using a structured questionnaire. The knowledge section included general knowledge, causes, symptoms, seizure triggers, first-aid measures, and recommended treatments. The Likert scale was used for the attitudes section. Answers about first-aid measures were categorized as helpful or harmful. The level of total knowledge score of 25 (7.7%) teachers was very high, 140 (43.3%) high, 141 (43.8%) moderate, and 17 (5.2%) low. The mean score about general knowledge was as follows: 6.1 (1.9), range = 0-9; causes 6.3 (1.9), range = 0-10; symptoms of seizures 8.5 (2.5), range = 0-12; and first-aid measures 6.8 (2.0), range = 0-11. Some 83% knew not taking anticonvulsants regularly could trigger seizures, and all teachers said a person with epilepsy should go see a physician. Attitudes were generally positive except for marriage and having children. The level of first-aid measures score of 8 (7.2) teachers was very high, 79 (70.5) high, 25 (22.3) low. Teachers with teaching experience at special schools took more helpful measures CONCLUSIONS: The knowledge of teachers about epilepsy was insufficient, attitudes toward people with epilepsy were generally positive, and first-aid measures at the last witnessed seizure were fairly helpful. Having teaching experience in special schools had a positive influence over knowledge and taking appropriate first-aid measure at time of the last witnessed seizure. © 2018 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  11. Incorporating spectroscopy and measurement technology into the high school chemistry laboratory

    Science.gov (United States)

    Harbert, Emily Ann

    Science and technology are becoming increasingly important in maintaining a healthy economy at home and a competitive edge on the world stage, though that is just one facet affected by inadequate science education in the United States. Engaging students in the pursuit of knowledge and giving them the skills to think critically are paramount. One small way to assist in achieving these goals is to increase the quality and variety of technology-rich activities conducted in high school classrooms. Incorporating more laboratory measurement technology into high schools may incite more student interest in the processes and practices of science and may allow students to learn to think more critically about their data and what it represents. The first objective of the work described herein was to determine what measurement technology is being used in schools and to what extent, as well as to determine other teacher needs and preferences. Second, the objective was to develop a new program to provide incoming freshmen (or rising seniors) with measurement technology training they did not receive in high school, and expose them to new research and career opportunities in science. The final objective was to create a technology-rich classroom laboratory activity for use in high schools.

  12. Globalizing security: A challenge for your generation, 25 May 2006, Washington, DC, Johns Hopkins University, Paul H. Nitze School of Advanced International Studies (SAIS)

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2006-01-01

    We still have not outlawed the 'big guns': nuclear weapons. Under the 1970 Treaty on the Non-Proliferation of Nuclear Weapons - the five countries that had nuclear weapons at the time - China, France, Great Britain, the Soviet Union and the United States - committed themselves to 'negotiate in good faith' effective measures for the elimination of nuclear weapons and, in the meantime, to share peaceful nuclear technology with any other countries party to the Treaty. In return, those other countries agreed not to pursue nuclear weapons. On the one hand, efforts to control the spread of nuclear weapons through the NPT treaty regime can be viewed as a remarkable success. With the exception of India, Israel and Pakistan, every country in the world has joined the NPT. The vast majority of NPT members have stood by their commitments. And the number of nuclear warheads has been reduced by more than 50 percent from its Cold War peak. On the other hand, in recent years, we seem to have come to an impasse, and many see the NPT regime as faltering. We have lost our sense of direction. Today we have eight or nine countries that possess nuclear weapons - and more than 20 other members of alliances that continue to rely on these weapons for their security. Some countries are actually announcing programmes for modernizing their stockpiles, and some have even spoken of the possibility of using such weapons - all the while insisting that they are off-limits to others. International peace and security cannot be achieved through business as usual with our existing norms and institutions. Clearly, these norms and institutions - whether the NPT or the UN Security Council - are far from perfect. They need to be strengthened in a variety of ways. But beyond the re-engineering of these norms and institutions, we need a complete change of mindset. Most importantly, our approach to security can no longer be centred on the idea of U s Versus Them . It must instead be anchored on the idea of

  13. A Measure for Pupils' Inconsistency of Response to a Self-Report Instrument of Attitudes toward School.

    Science.gov (United States)

    Darom, Efraim; Rich, Yisrael

    1983-01-01

    To measure pupils' inconsistency in replying to a self-report questionnaire regarding attitudes toward school, 6,000 elementary and secondary school students participated in a nation-wide project to construct and validate the Israeli Quality of School Life Questionnaire (IQSL). (PN)

  14. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  15. PNNL Measurement Results for the 2016 Criticality Accident Dosimetry Exercise at the Nevada National Security Stite (IER-148)

    Energy Technology Data Exchange (ETDEWEB)

    Rathbone, Bruce A.; Morley, Shannon M.; Stephens, John A.

    2017-05-01

    The Pacific Northwest National Laboratory (PNNL) participated in a criticality accident dosimetry intercomparison exercise held at the Nevada National Security Site (NNSS) May 24-27, 2016. The exercise was administered by Lawrence Livermore National Laboratory (LLNL) and consisted of three exposures performed using the Godiva-IV critical assembly housed in the Device Assembly Facility (DAF) located on the NNSS site. The exercise allowed participants to test the ability of their nuclear accident dosimeters to meet the performance criteria in ANSI/HPS N13.3-2013, Dosimetry for Criticality Accidents and to obtain new measurement data for use in revising dose calculation methods and quick sort screening methods where appropriate. PNNL participated with new prototype Personal Nuclear Accident Dosimeter (PNAD) and Fixed Nuclear Accident Dosimeter (FNAD) designs as well as the existing historical PNAD design. The new prototype designs incorporate optically stimulated luminescence (OSL) dosimeters in place of thermoluminescence dosimeters (TLDs), among other design changes, while retaining the same set of activation foils historically used. The default dose calculation methodology established decades ago for use with activation foils in PNNL PNADs and FNADs was used to calculate neutron dose results for both the existing and prototype dosimeters tested in the exercise. The results indicate that the effective cross sections and/or dose conversion factors used historically need to be updated to accurately measure the operational quantities recommended for nuclear accident dosimetry in ANSI/HPS N13.3-2013 and to ensure PNAD and FNAD performance meets the ANSI/HPS N13.3-2013 performance criteria. The operational quantities recommended for nuclear accident dosimetry are personal absorbed dose, Dp(10), and ambient absorbed dose, D*(10).

  16. Objectively measured physical activity in Danish after-school cares: Does sport certification matter?

    Science.gov (United States)

    Domazet, S L; Møller, N C; Støckel, J T; Ried-Larsen, M

    2015-12-01

    Inactivity and more sedentary time predominate the daily activity level of many of today's children. In Denmark, certified sport after-school cares have been established in order to increase children's daily physical activity (PA) level. This cross-sectional study aimed to investigate the activity level among participants in certified sport after-school cares vs regular after-school cares. The study was carried out in 2011 in 10 after-school cares (5 sport/5 regular) throughout Denmark, whereof 475 children aged 5-11 years participated. PA level was assessed using Actigraph GT3X and GT3X+ activity monitors worn by the children for at least 8 consecutive days. Anthropometry and cardiorespiratory fitness were measured as well. A multivariate regression analysis was carried out to check for the differences in the PA level across the two care systems. However, there did not appear to be any differences in overall PA or in time-specific day parts (e.g., during after-school care). The activity levels were quite similar across after-school cares and were mutually high during time spent in the care facility. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  17. Measurement of potential alpha energy concentration in some schools in Shillong city

    International Nuclear Information System (INIS)

    Maibam, Deveshwori; Sharma, Yubaraj; Saxena, Atul; Walia, Devesh; Diengdoh, Evamary; Rapmai, Aibora K.

    2011-01-01

    Radon and its progeny account for more than 50% of total natural radiation exposure to humans and are considered to an important cause of lung cancer (UNSCEAR, 2008). Indoor radon levels are much higher than outdoor levels hence the importance of assessing radon levels in indoor environments, particularly schools which serve as a significant source of radon exposure both for children and the staffs. Children have smaller lung volumes and higher breathing rates therefore an augmented radon concentration results to a higher radiation dose in children. In our study, potential alpha energy concentration (PAEC) of 20 schools in Shillong region has been measured using the SSNTD method with LR-115 type 2 detectors. The detectors in bare mode were placed in class rooms at different floors of each school during winter and summer season. The detectors in bare mode were placed in class rooms at diff rent floors of each school during winter and summer season. The PAEC (mWL) at each of the selected schools are calculated and it ranges from 2.56 - 58.2 mWL (Arithmetic mean) and 2.34 - 58.18 mWL (Geometric mean). And the annual effective dose equivalent (AEDE) ranges from 0.74 - 17.85 mSv.y -1 . This preliminary study shows that the AEDE values of the schools under study are below the prescribed action limit by AERB i.e. 30 mSv.y -1 . (author)

  18. Development of an Instrument to Measure Higher Order Thinking Skills in Senior High School Mathematics Instruction

    Science.gov (United States)

    Tanujaya, Benidiktus

    2016-01-01

    The purpose of this research was to develop an instrument that can be used to measure higher-order thinking skills (HOTS) in mathematics instruction of high school students. This research was conducted using a standard procedure of instrument development, from the development of conceptual definitions, development of operational definitions,…

  19. Determining the Measurement Quality of a Montessori High School Teacher Evaluation Survey

    Science.gov (United States)

    Setari, Anthony Philip; Bradley, Kelly D.

    2017-01-01

    The purpose of this study was to conduct a psychometric validation of a course evaluation instrument, known as a student evaluation of teaching (SET), implemented in a Montessori high school. The authors demonstrate to the Montessori community how to rigorously examine the measurement and assessment quality of instruments used within Montessori…

  20. Airway resistance measurements in pre-school children with asthmatic symptoms : The interrupter technique

    NARCIS (Netherlands)

    Kooi, EMW; Schokker, S; van der Molen, T; Duiverman, EJ

    Measuring airway resistance in pre-school children with the interrupter technique has proven to be feasible and reliable in daily clinical practice and research settings. Whether it contributes to diagnosing asthma in pre-schoot children still remains uncertain. From the results of previous studies

  1. Towards the Development of More Comprehensive Measures of School District Wealth.

    Science.gov (United States)

    Thornton, Robert J.

    The author tests several ways in which income can be added to property wealth to improve the measurement of school-district fiscal capacity. His first chapter discusses the economic and legal reasons for this improvement, notes that seven states already combine income and property, and distinguishes adding income and property together from…

  2. Technology Readiness of School Teachers: An Empirical Study of Measurement and Segmentation

    Science.gov (United States)

    Badri, Masood; Al Rashedi, Asma; Yang, Guang; Mohaidat, Jihad; Al Hammadi, Arif

    2014-01-01

    The Technology Readiness Index (TRI) developed by Parasuraman (2000) was adapted to measure the technology readiness of public school teachers in Abu Dhabi, United Arab Emirates. The study aims at better understanding the factors (mostly demographics) that affect such readiness levels. In addition, Abu Dhabi teachers are segmented into five main…

  3. Optimized collection, storage and measurement of radon and radon decay products - school experiments

    International Nuclear Information System (INIS)

    Philipsborn, H. von; Geipel, R.; Just, G.

    1998-01-01

    Schools are expected more than ever to teach in physics and chemistry an understanding of radioactivity in its many aspects. Simple experiments on the occurrence, the measurement and the properties of radionuclides are necessary for true understanding. Such experiments are now possible with novel methods of collection and storage of ubiquitous radon and radon decay products from air, water and solids. (orig.) [de

  4. Comparison of Measures of Morphosyntactic Complexity in French-Speaking School-Aged Children

    Science.gov (United States)

    Mimeau, Catherine; Plourde, Vickie; Ouellet, Andrée-Anne; Dionne, Ginette

    2015-01-01

    This study examined the validity and reliability of different measures of morphosyntactic complexity, including the Morphosyntactic Complexity Scale (MSCS), a novel adaptation of the Developmental Sentence Scoring, in French-speaking school-aged children. Seventy-three Quebec children from kindergarten to Grade 3 completed a definition task and a…

  5. Constructing a multiple choice test to measure elementary school teachers' Pedagogical Content Knowledge of technology education.

    NARCIS (Netherlands)

    Rohaan, E.J.; Taconis, R.; Jochems, W.M.G.

    2009-01-01

    This paper describes the construction and validation of a multiple choice test to measure elementary school teachers' Pedagogical Content Knowledge of technology education. Pedagogical Content Knowledge is generally accepted to be a crucial domain of teacher knowledge and is, therefore, an important

  6. Advances in Children's Rights and Children's Well-Being Measurement: Implications for School Psychologists

    Science.gov (United States)

    Kosher, Hanita; Jiang, Xu; Ben-Arieh, Asher; Huebner, E. Scott

    2014-01-01

    Recent years have brought important changes to the profession of school psychology, influenced by larger social, scientific, and political trends. These trends include the emergence of children's rights agenda and advances in children's well-being measurement. During these years, a growing public attention and commitment to the notion of…

  7. Measuring Spanish Orthographic Development in Private, Public and Subsidised Schools in Chile

    Science.gov (United States)

    Helman, Lori; Delbridge, Anne; Parker, David; Arnal, Martina; Jara Mödinger, Luz

    2016-01-01

    The current study has a twofold purpose: first, to determine the reliability of a tool for assessing orthographic development in Spanish; second, to assess differences in students' performance on the measure across multiple types of primary schools in a large city in Chile. A Spanish developmental spelling inventory that contained words of…

  8. Does the EDI Equivalently Measure Facets of School Readiness for Aboriginal and Non-Aboriginal Children?

    Science.gov (United States)

    Muhajarine, Nazeem; Puchala, Chassidy; Janus, Magdalena

    2011-01-01

    The aim of the current paper was to examine the equivalence of the Early Development Instrument (EDI), a teacher rating measure of school readiness, for Aboriginal and non-Aboriginal children. The current study used an approach, which analyzes the structure and properties of the EDI at the subdomain level. Similar subdomain score distributions…

  9. Behavioral determinants of mothers' safety measures to prevent injuries of pre-school children.

    NARCIS (Netherlands)

    Wortel, E.; Geus, G.H. de; Kok, G.

    1995-01-01

    Home-related injuries are a major threat to pre-school children in the western world. In this study the behavioral determinants of 18 parental safety measures were assessed. To select behavioral determinants, the Attitude-Social influence-Self-efficacy/barriers model was used with the inclusion of

  10. Reliability and Validity of Michigan School Libraries for the 21st Century Measurement Benchmarks

    Science.gov (United States)

    Floyd, Natosha N.

    2016-01-01

    The purpose of this study was to examine the psychometric properties of the Michigan School Libraries for the 21st Century Measurement Benchmarks (SL21). The instrument consists of 19 items with three subscales: Building the 21st Century Learning Environment Subscale, Teaching for 21st Century Learning Subscale, and Leading the Way to 21st Century…

  11. Development of Population-Based Resilience Measures in the Primary School Setting

    Science.gov (United States)

    Sun, Jing; Stewart, Donald

    2007-01-01

    Purpose: The purpose of the population-based study in the paper is to report on progress in formulating instruments to measure children's resilience and associated protective factors in family, primary school and community contexts. Design/methodology/approach: In this paper a total of 2,794 students, 1,558 parents/caregivers, and 465 staff were…

  12. Measuring Parenting Practices among Parents of Elementary School-Age Youth

    Science.gov (United States)

    Randolph, Karen A.; Radey, Melissa

    2011-01-01

    Objectives: The objective of this study is to establish the factor structure of the Alabama Parenting Questionnaire (APQ), an instrument designed to measure parenting practices among parents of elementary school children. Methods: Exploratory (EFA) and confirmatory factor analytic (CFA) procedures are used to validate the APQ with 790 parents of…

  13. Measurements of ultrafine particles and other vehicular pollutants inside school buses in South Texas

    Science.gov (United States)

    Zhang, Qunfang; Zhu, Yifang

    2010-01-01

    Increasing evidence has demonstrated toxic effects of vehicular emitted ultrafine particles (UFPs, diameter pollutants, especially UFPs, was measured inside four diesel-powered school buses. Two 1990 and two 2006 model year diesel-powered school buses were selected to represent the age extremes of school buses in service. Each bus was driven on two routine bus runs to study school children's exposure under different transportation conditions in South Texas. The number concentration and size distribution of UFPs, total particle number concentration, PM 2.5, PM 10, black carbon (BC), CO, and CO 2 levels were monitored inside the buses. The average total particle number concentrations observed inside the school buses ranged from 7.3 × 10 3 to 3.4 × 10 4 particles cm -3, depending on engine age and window position. When the windows were closed, the in-cabin air pollutants were more likely due to the school buses' self-pollution. The 1990 model year school buses demonstrated much higher air pollutant concentrations than the 2006 model year ones. When the windows were open, the majority of in-cabin air pollutants came from the outside roadway environment with similar pollutant levels observed regardless of engine ages. The highest average UFP concentration was observed at a bus transfer station where approximately 27 idling school buses were queued to load or unload students. Starting-up and idling generated higher air pollutant levels than the driving state. Higher in-cabin air pollutant concentrations were observed when more students were on board.

  14. Validation of the Spanish Version of the School Engagement Measure (SEM).

    Science.gov (United States)

    Ramos-Díaz, Estibaliz; Rodríguez-Fernández, Arantzazu; Revuelta, Lorena

    2016-11-24

    The scientific study of school engagement has recently been the subject of considerable interest in the field of educational psychology, and significant advances have been made in our knowledge of this construct. For instance, there is currently consensus in the scientific community that it is multifaceted, and has three dimensions: behavioral engagement, emotional engagement, and cognitive engagement. However, more advanced statistical analyses are needed to validate Spanish-language measures of school engagement, which this study proposes to do. The sample was comprised of 1,250 adolescents from Basque Country (49% boys, 51% girls) aged 12 to 15 years old (M = 13.72, SD = 1.09). The results of confirmatory factor analysis on the School Engagement Measure (Fredricks, Blumenfeld, Friedel, & Paris, 2005) supported a three-dimensional structure of school engagement (χ2 (100) = 676.93, p satisfactory, ranging from .83 to .94. Adequate evidence of concurrent validity was found for the variable perceived school performance (p < .01). The results are discussed from an educational perspective, and with an eye to future research.

  15. Development of DSRC device and communication system performance measures recommendations for DSRC OBE performance and security requirements.

    Science.gov (United States)

    2016-05-22

    This report presents recommendations for minimum DSRC device communication performance and security : requirements to ensure effective operation of the DSRC system. The team identified recommended DSRC : communications requirements aligned to use cas...

  16. The ultimate emergency measures to secure a NPP under an accidental condition with no designed power or water supply

    Energy Technology Data Exchange (ETDEWEB)

    Liang, K.S., E-mail: ksliang@alum.mit.edu [Institute of Nuclear Engineering and Science, National Tsing Hua University, 101 Sec. 2, Kuang-Fu Road, Hsinchu 30013, Taiwan (China); School of Nuclear Science and Engineering, Shanghai Jiao Tong University, 800 Dong-Chuan Road, Shanghai (China); Chiang, S.C. [Department of Nuclear Safety, Taiwan Power Company, 242 Sec. 3, Roosevelt Road, Taipei 10016, Taiwan (China); Hsu, Y.F.; Young, H.J.; Pei, B.S. [Institute of Nuclear Engineering and Science, National Tsing Hua University, 101 Sec. 2, Kuang-Fu Road, Hsinchu 30013, Taiwan (China); Wang, L.C. [Department of Nuclear Safety, Taiwan Power Company, 242 Sec. 3, Roosevelt Road, Taipei 10016, Taiwan (China)

    2012-12-15

    Highlights: Black-Right-Pointing-Pointer An ultimate measure to secure core was developed, if power or water supply cannot be restored in time. Black-Right-Pointing-Pointer This ultimate measure was simulated by RELAP5-3D to verify the concept of this emergency plan. Black-Right-Pointing-Pointer Quantification of the required raw water injection rate was performed for NPPS in Taiwan Black-Right-Pointing-Pointer Reactor controlled depressurization within the 1st hour is essential to reduce the required raw water injection rate. Black-Right-Pointing-Pointer For PWR, even heat sink can be developed, RCP seal leak might eventually cause core uncover 10 h after seal leak occurs. - Abstract: In the recent nuclear catastrophe which occurred in Japan on March 11, 2011, several units of Fukushima conventional BWR experienced a total loss of power and water supply triggered by a heavy earthquake and a following Tsunami beyond design basis. In Fukushima accident it was observed that sea water was injected into reactors only after hydrogen explosion took place and it was considered a little too late to prevent core from damage. With regard to this fact, the Taiwan power company develops an ultimate measure to prevent reactor from encountering core damage, if either designed AC power or reactor water supply cannot be restored in time. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. Once any designed AC power or reactor water supply is made available, this DIVing plan will be activated to (1) depressurize reactor first, (2) inject any available water into reactor by any available power supply if this critical status cannot be restored in time, and (3) vent the containment if necessary to maintain containment integrity. In this paper the DIVing plan was simulated by RELAP5-3D to verify the concept of it and also to quantify the required raw water injection rate to prevent core from damage for both

  17. The ultimate emergency measures to secure a NPP under an accidental condition with no designed power or water supply

    International Nuclear Information System (INIS)

    Liang, K.S.; Chiang, S.C.; Hsu, Y.F.; Young, H.J.; Pei, B.S.; Wang, L.C.

    2012-01-01

    Highlights: ► An ultimate measure to secure core was developed, if power or water supply cannot be restored in time. ► This ultimate measure was simulated by RELAP5-3D to verify the concept of this emergency plan. ► Quantification of the required raw water injection rate was performed for NPPS in Taiwan ► Reactor controlled depressurization within the 1st hour is essential to reduce the required raw water injection rate. ► For PWR, even heat sink can be developed, RCP seal leak might eventually cause core uncover 10 h after seal leak occurs. - Abstract: In the recent nuclear catastrophe which occurred in Japan on March 11, 2011, several units of Fukushima conventional BWR experienced a total loss of power and water supply triggered by a heavy earthquake and a following Tsunami beyond design basis. In Fukushima accident it was observed that sea water was injected into reactors only after hydrogen explosion took place and it was considered a little too late to prevent core from damage. With regard to this fact, the Taiwan power company develops an ultimate measure to prevent reactor from encountering core damage, if either designed AC power or reactor water supply cannot be restored in time. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. Once any designed AC power or reactor water supply is made available, this DIVing plan will be activated to (1) depressurize reactor first, (2) inject any available water into reactor by any available power supply if this critical status cannot be restored in time, and (3) vent the containment if necessary to maintain containment integrity. In this paper the DIVing plan was simulated by RELAP5-3D to verify the concept of it and also to quantify the required raw water injection rate to prevent core from damage for both PWR and BWR plants in Taiwan, after the loss of passive cooling mechanism. Provided the passive cooling mechanism is lost

  18. The Development and Evaluation of a Peer-Training Program for Elementary School Students Teaching Secure Internet Use

    Science.gov (United States)

    Korkmaz, Murat; Esen, Binnaz Kiran

    2013-01-01

    The aim of this study is to design and evaluate a peer-training program about changing students' internet use habits. This study was conducted with students from two different elementary schools in Mersin, Turkey, who were enrolled in 7th or 8th grade in the 2009-2010 academic year. A total of 24 students participated in the program, 12 of whom…

  19. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  20. Measurement Error in Income and Schooling and the Bias of Linear Estimators

    DEFF Research Database (Denmark)

    Bingley, Paul; Martinello, Alessandro

    2017-01-01

    and Retirement in Europe data with Danish administrative registers. Contrary to most validation studies, we find that measurement error in income is classical once we account for imperfect validation data. We find nonclassical measurement error in schooling, causing a 38% amplification bias in IV estimators......We propose a general framework for determining the extent of measurement error bias in ordinary least squares and instrumental variable (IV) estimators of linear models while allowing for measurement error in the validation source. We apply this method by validating Survey of Health, Ageing...

  1. Care and supportive measures in school-aged children with prenatal substance exposure.

    Science.gov (United States)

    Sandtorv, Lisbeth B; Haugland, Siren; Elgen, Irene

    2017-12-01

    Prenatal exposure to substances, including alcohol, opiates, and a number of illicit drugs, may have a negative impact on fetal development. Studies have shown that substance exposure can influence a child's neurodevelopment and the need for care and supportive measures. In this study, we aimed to investigate the care status and the level of supportive measures in school-aged children prenatally exposed to alcohol and other substances. This study included children aged between 6 and 14 years who were referred to Haukeland University Hospital in Norway with developmental impairment and a history of prenatal substance exposure. Participants were classified according to their main prenatal exposure to either alcohol or other substances. Information on care status and supportive measures was obtained from medical records and participants' caregivers. We also compared the use of supportive measures for children placed into foster care before and after 1 year of age. A total of 111 (87% of 128 referrals) eligible children participated in the study. Of these 111 children, 96 (86%) were in foster care, of whom 29 (30%) were placed into foster care during their first year of life and 83 out of 90 (92%) had supportive measures, including reinforced foster care and school or social support. A high proportion of the sample lived in foster care and received supportive measures. Findings may reflect an increased need of care and support in school-aged children with prenatal substance exposure, highlighting the importance of awareness among caregivers and public agencies.

  2. State-level high school completion rates: Concepts, measures, and trends.

    Directory of Open Access Journals (Sweden)

    John Robert Warren

    2005-12-01

    Full Text Available Since the mid 1970s the national rate at which incoming 9th graders have completed high school has fallen slowly but steadily; this is also true in 41 states. In 2002, about three in every four students who might have completed high school actually did so; in some states this figure is substantially lower. In this paper I review state-level measures of high school completion rates and describe and validate a new measure that reports these rates for 1975 through 2002. Existing measures based on the Current Population Survey are conceptually imperfect and statistically unreliable. Measures based on Common Core Data (CCD dropout information are unavailable for many states and have different conceptual weaknesses. Existing measures based on CCD enrollment and completion data are systematically biased by migration, changes in cohort size, and/or grade retention. The new CCD-based measure described here is considerably less biased, performs differently in empirical analyses, and gives a different picture of the dropout situation across states and over time.

  3. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  4. 6th Annual Homeland Security and Defense Education Summit, Developing an Adaptive Homeland Security Environment

    OpenAIRE

    2013-01-01

    6th Annual Homeland Security and Defense Education Summit Developing an Adaptive Homeland Security Environment, Burlington, MA, September 26-28, 2013 2013 Summit Agenda Naval Postgraduate School Center for Homeland Defense and Security In Partnership With Northeastern University, Department of Homeland Security, Federal Emergency Management Agency, National Guard Homeland Security Institute, National Homeland Defense Foundation Naval Postgraduate School Center for Homeland Defense and S...

  5. Systematic indoor radon and gamma-ray measurements in Slovenian schools

    International Nuclear Information System (INIS)

    Vaupotic, J.; Sikovec, M.; Kobal, I.

    2000-01-01

    During the winter months of 1992/93 and 1993/94, instantaneous indoor radon concentrations and gamma dose rates were measured in 890 schools in Slovenia attended in total by about 280,000 pupils. Under closed conditions, the room to be surveyed was closed for more than 12 h prior to sampling, the air was sampled into alpha scintillation cells with a volume of 700 cm 3 , and alpha activity was measured. An arithmetic mean of 168 Bq m -3 and a geometric mean of 82 Bq m -3 were obtained. In 67% of schools, indoor radon concentrations were below 100 Bq m -3 , and in 8.7% (77 schools with about 16,000 pupils) they exceeded 400 Bq m -3 , which is the proposed Slovene action level. In the majority of cases, radon concentrations were high due to the geological characteristics of the ground. Approximately 70% of schools with high radon levels were found in the Karst region. Gamma dose rates were measured using a portable scintillation counter. An arithmetic mean of 102 nGy h -1 and a geometric mean of 95 nGy h -1 were obtained. No extraordinarily high values were recorded

  6. Indoor radon concentration measurements in Tarqumia Girl Schools at Western Hebron Region, Palestine

    International Nuclear Information System (INIS)

    Dabyneh, K.M.

    2006-01-01

    In this study, radon-222 in indoor air was surveyed in 62 rooms located in four governmental schools, for girls, in Tarqumia town that lies in the north western part of Hebron city in Palestine. The annual effective dose equivalents resulting from the inhalation of radon and its daughters by 2318 pupils and 102 staff members occupying the surveyed rooms were also measured. TASTRAK, a solid state nuclear track detector, has been used to measure the indoor radon concentrations at those schools thus, 124 radon detectors were distributed in the four school buildings. The radon detectors stayed for 70 days between February 2006 and April 2006. The results showed that the radon concentration and the annual effective dose equivalent in these schools were varied from 12 to 232.5 Bq/m 3 with an average of 34.1 Bq/m 3 and 0.62 to 12.0 mSv/y with an average of 1.76 mSv/y, respectively. The mean values of radon concentrations in Tarqumia secondary girls school, Al-aqsa elementary girls school, Umsalama elementary girls school and Tarqumia elementary girls school were 35.8, 26.7, 25.9 and 47.8 Bq/m 3 , respectively, and the mean values of the annual effective dose equivalent for the above mentioned were 1.85, 1.38, 1.34 and 2.47 mSv/y, respectively. It has been found from these results that, most of the values were of nominal state values (that is less than the allowed global values) and in few places, the concentration was higher than the allowed global values, therefore, the annual effective dose higher than annual global level values (1.3 mSv/y) was resulted. Poor ventilation and old buildings were, most mobility, the main cause of these high radon concentrations. Improving ventilation of these places will increase air exchange rates with the out side, thereby resulting in reduced concentration. In general, the results showed that protection against radiological hazards would not be necessary for pupils and staff members occupying the rooms of the investigated schools

  7. Personality traits measured at baseline can predict academic performance in upper secondary school three years late.

    Science.gov (United States)

    Rosander, Pia; Bäckström, Martin

    2014-12-01

    The aim of the present study was to explore the ability of personality to predict academic performance in a longitudinal study of a Swedish upper secondary school sample. Academic performance was assessed throughout a three-year period via final grades from the compulsory school and upper secondary school. The Big Five personality factors (Costa & McCrae, ) - particularly Conscientiousness and Neuroticism - were found to predict overall academic performance, after controlling for general intelligence. Results suggest that Conscientiousness, as measured at the age of 16, can explain change in academic performance at the age of 19. The effect of Neuroticism on Conscientiousness indicates that, as regarding getting good grades, it is better to be a bit neurotic than to be stable. The study extends previous work by assessing the relationship between the Big Five and academic performance over a three-year period. The results offer educators avenues for improving educational achievement. © 2014 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  8. Measurement and structural relations of an authoritative school climate model: A multi-level latent variable investigation.

    Science.gov (United States)

    Konold, Timothy R; Cornell, Dewey

    2015-12-01

    This study tested a conceptual model of school climate in which two key elements of an authoritative school, structure and support variables, are associated with student engagement in school and lower levels of peer aggression. Multilevel multivariate structural modeling was conducted in a statewide sample of 48,027 students in 323 public high schools who completed the Authoritative School Climate Survey. As hypothesized, two measures of structure (Disciplinary Structure and Academic Expectations) and two measures of support (Respect for Students and Willingness to Seek Help) were associated with higher student engagement (Affective Engagement and Cognitive Engagement) and lower peer aggression (Prevalence of Teasing and Bullying) on both student and school levels of analysis, controlling for the effects of school demographics (school size, percentage of minority students, and percentage of low income students). These results support the extension of authoritative school climate model to high school and guide further research on the conditions for a positive school climate. Copyright © 2015 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.

  9. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  10. Globalizing security: A challenge for your generation, 25 May 2006, Washington, DC, Johns Hopkins University, Paul H. Nitze School of Advanced International Studies (SAIS)[John Hopkins University, Paul H. Nitze School of Advanced International Studies (SAIS)

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2006-05-25

    We still have not outlawed the 'big guns': nuclear weapons. Under the 1970 Treaty on the Non-Proliferation of Nuclear Weapons - the five countries that had nuclear weapons at the time - China, France, Great Britain, the Soviet Union and the United States - committed themselves to 'negotiate in good faith' effective measures for the elimination of nuclear weapons and, in the meantime, to share peaceful nuclear technology with any other countries party to the Treaty. In return, those other countries agreed not to pursue nuclear weapons. On the one hand, efforts to control the spread of nuclear weapons through the NPT treaty regime can be viewed as a remarkable success. With the exception of India, Israel and Pakistan, every country in the world has joined the NPT. The vast majority of NPT members have stood by their commitments. And the number of nuclear warheads has been reduced by more than 50 percent from its Cold War peak. On the other hand, in recent years, we seem to have come to an impasse, and many see the NPT regime as faltering. We have lost our sense of direction. Today we have eight or nine countries that possess nuclear weapons - and more than 20 other members of alliances that continue to rely on these weapons for their security. Some countries are actually announcing programmes for modernizing their stockpiles, and some have even spoken of the possibility of using such weapons - all the while insisting that they are off-limits to others. International peace and security cannot be achieved through business as usual with our existing norms and institutions. Clearly, these norms and institutions - whether the NPT or the UN Security Council - are far from perfect. They need to be strengthened in a variety of ways. But beyond the re-engineering of these norms and institutions, we need a complete change of mindset. Most importantly, our approach to security can no longer be centred on the idea of {sup U}s Versus Them{sup .} It must instead be anchored on the

  11. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  12. The creation and validation of an instrument to measure school STEM Culture

    Science.gov (United States)

    White, Christopher

    Although current research exists on school culture, there is a gap in the literature on specialized aspects of culture such as STEM Culture defined as the beliefs, values, practices, resources, and challenges in STEM fields (Science, Technology, Engineering and Mathematics) within a school. The objective of this study was to create a valid and reliable instrument, the STEM Culture Assessment Tool (STEM-CAT), that measures this cultural aspect based on a survey of stakeholder groups within the school community and use empirical data to support the use of this instrument to measure STEM Culture. Items were created and face validity was determined through a focus group and expert review before a pilot study was conducted to determine reliability of the items. Once items were determined reliable, the survey was given to eight high schools and results were correlated to the percentage of seniors who self-reported whether they intend to pursue STEM fields upon graduation. The results of this study indicate further need for research to determine how the STEM-CAT correlates to STEM culture due to some inconsistencies with the dependent variable in this study. Future research could be done correlating the results of the STEM-CAT with participation in Advanced Placement science and mathematics, SAT/ACT scores in science and mathematics or the number of students who actually pursue STEM fields rather than a prediction halfway through the 12th grade.

  13. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  14. Measures of School Integration: Comparing Coleman's Index to Measures of Species Diversity.

    Science.gov (United States)

    Mercil, Steven Bray; Williams, John Delane

    This study used species diversity indices developed in ecology as a measure of socioethnic diversity, and compared them to Coleman's Index of Segregation. The twelve indices were Simpson's Concentration Index ("ell"), Simpson's Index of Diversity, Hurlbert's Probability of Interspecific Encounter (PIE), Simpson's Probability of…

  15. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  16. Enlightenment and measurement - a way to improve health among high school students

    DEFF Research Database (Denmark)

    Greve, Jane; Andersen, Lars Bo

    2012-01-01

    Abstract This paper examines the effect of participating in a web-based health programme that promotes personal tracking of high school students' own measurements of a number of health-related parameters. Danish cross-sectional survey data were used to examine the effects of the health programme...... feeling of wellbeing among students, especially those with high BMI levels and poor aerobic fitness. As the schools participated in the health programme on voluntary basis and at a financial cost to themselves, the positive effects of participation found can only be stated to be valid among students from...... on various health measures. Both quantile regression models and standard ordinary least squares (OLS) models were used to explore the correlations between the students' participation in the health programme and their body mass index (BMI), body fat percentage, aerobic fitness, and well-being. Participation...

  17. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  18. International conference on security of material. Measures to prevent, intercept and respond to illicit uses of nuclear material and radioactive sources. Book of extended synopses

    International Nuclear Information System (INIS)

    2001-10-01

    The papers cover the subjects relating to the trafficking of highly enriched nuclear materials, less radioactive, radioactive materials, radiations sources, prevention of crime, capabilities of preventing smuggling, radiation detection devices that are or should be applied on borders. Different aspects of physical protection, security and safety of nuclear materials in a number of countries are discussed. A number of papers are devoted to detectors, and measuring methods

  19. International conference on security of material. Measures to prevent, intercept and respond to illicit uses of nuclear material and radioactive sources. Book of extended synopses

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-10-01

    The papers cover the subjects relating to the trafficking of highly enriched nuclear materials, less radioactive, radioactive materials, radiations sources, prevention of crime, capabilities of preventing smuggling, radiation detection devices that are or should be applied on borders. Different aspects of physical protection, security and safety of nuclear materials in a number of countries are discussed. A number of papers are devoted to detectors, and measuring methods.

  20. Unique contributions of dynamic versus global measures of parent-child interaction quality in predicting school adjustment.

    Science.gov (United States)

    Bardack, Sarah; Herbers, Janette E; Obradović, Jelena

    2017-09-01

    This study investigates the unique contribution of microsocial and global measures of parent-child positive coregulation (PCR) in predicting children's behavioral and social adjustment in school. Using a community sample of 102 children, ages 4-6, and their parents, we conducted nested path analytic models to identify the unique effects of 2 measures of PCR on school outcomes. Microsocial PCR independently predicted fewer externalizing and inattention/impulsive behaviors in school. Global PCR did not uniquely relate to children's behavioral and social adjustment outcomes. Household socioeconomic status was related to both microsocial and global measures of PCR, but not directly associated with school outcomes. Findings illustrate the importance of using dynamic measures of PCR based on microsocial coding to further understand how the quality of parent-child interaction is related to children's self-regulatory and social development during school transition. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Hand-Held Sunphotometers for High School Student Construction and Measuring Aerosol Optical Thickness

    Science.gov (United States)

    Almonor, Linda; Baldwin, C.; Craig, R.; Johnson, L. P.

    2000-01-01

    Science education is taking the teaching of science from a traditional (lecture) approach to a multidimensional sense-making approach which allows teachers to support students by providing exploratory experiences. Using projects is one way of providing students with opportunities to observe and participate in sense-making activity. We created a learning environment that fostered inquiry-based learning. Students were engaged in a variety of Inquiry activities that enabled them to work in cooperative planning teams where respect for each other was encouraged and their ability to grasp, transform and transfer information was enhanced. Summer, 1998: An air pollution workshop was conducted for high school students in the Medgar Evers College/Middle College High School Liberty Partnership Summer Program. Students learned the basics of meteorology: structure and composition of the atmosphere and the processes that cause weather. The highlight of this workshop was the building of hand-held sunphotometers, which measure the intensity of the sunlight striking the Earth. Summer, 1999: high school students conducted a research project which measured the mass and size of ambient particulates and enhanced our ability to observe through land based measurements changes in the optical depth of ambient aerosols over Brooklyn. Students used hand held Sunphotometers to collect data over a two week period and entered it into the NASA GISS database by way of the internet.

  2. Promotion of Preventive Measures in Public Nursery Schools: Lessons From the H1N1 Pandemic.

    Science.gov (United States)

    Michail, Koralia A; Ioannidou, Christina; Galanis, Petros; Tsoumakas, Kostantinos; Pavlopoulou, Ioanna D

    2017-09-01

    Nursery schools serve as reservoirs of transmission of infectious diseases, and teachers should be able to implement and monitor hygiene measures to prevent them. The aim of the present study was to assess the compliance of nursery school teachers on promoting preventive interventions and to identify associated factors, during the novel H1N1 influenza pandemic. A secondary objective was to evaluate their knowledge and vaccination status regarding the novel virus. A cross-sectional study was performed, with the use of a predesigned anonymous, questionnaire, and distributed to all public nursery teachers of Athens, Greece. General etiquette practices were highly acceptable to over 92% of teachers. Those with longer teaching experience promoted simple preventive measures, such as hand washing and use of hand sanitizer, more often while older children were more likely to familiarize with them. However, teachers presented inadequate knowledge concerning the novel virus and their vaccination rates with the pandemic vaccine were unacceptably low (1.1%). Our study showed that promotion of simple preventive measures is feasible and may contribute to the prevention of outbreaks in nursery schools, although knowledge gaps and fear concerning the pandemic vaccine highlight communication issues.

  3. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  4. SOCIAL SECURITY IN MODERN ERA

    African Journals Online (AJOL)

    2018-03-28

    Mar 28, 2018 ... Lecturer, Department of Social Work, Bindura University of Science Education; Email. ... Lecturer, School of Social Work, University of Zimbabwe, Mount ... There are two types of informal social security: traditional or family ...

  5. Measuring functional, interactive and critical health literacy of Chinese secondary school students: reliable, valid and feasible?

    Science.gov (United States)

    Guo, Shuaijun; Davis, Elise; Yu, Xiaoming; Naccarella, Lucio; Armstrong, Rebecca; Abel, Thomas; Browne, Geoffrey; Shi, Yanqin

    2018-04-01

    Health literacy is an increasingly important topic in the global context. In mainland China, health literacy measures mainly focus on health knowledge and practices or on the functional domain for adolescents. However, little is known about interactive and critical domains. This study aimed to adopt a skills-based and three-domain (functional, interactive and critical) instrument to measure health literacy in Chinese adolescents and to examine the status and determinants of each domain. Using a systematic review, the eight-item Health Literacy Assessment Tool (HLAT-8) was selected and translated from English to Chinese (c-HLAT-8). Following the translation process, a cross-sectional study was conducted in four secondary schools in Beijing, China. A total of 650 students in Years 7-9 were recruited to complete a self-administered questionnaire that assessed socio-demographics, self-efficacy, social support, school environment, community environment and health literacy. Results showed that the c-HLAT-8 had satisfactory reliability (Cronbach's α = 0.79; intra-class correlation coefficient = 0.72) and strong validity (translation validity index (TVI) ≥0.95; χ 2 / df = 3.388, p students had an average score of 26.37 (±5.89) for the c-HLAT-8. When the determinants of each domain of health literacy were examined, social support was the strongest predictor of interactive and critical health literacy. On the contrary, self-efficacy and school environment played more dominant roles in predicting functional health literacy. The c-HLAT-8 was demonstrated to be a reliable, valid and feasible instrument for measuring functional, interactive and critical health literacy among Chinese students. The current findings indicate that increasing self-efficacy, social support and creating supportive environments are important for promoting health literacy in secondary school settings in China.

  6. Measuring the academic, social, and psychological effects of academic service learning on middle school students

    Science.gov (United States)

    Giacalone, Valarie A.

    The purpose of this study was to examine the effects of an academic service learning project on ninth-grade students' science achievement and attitudes. A quasi-experimental, pretest-posttest design was used with four classes of one teacher in a rural school. The treatment was an Energy Fair service project. Two treatment classes that were chosen by random assignment (n = 58) were compared to two control classes (n = 64), who performed an alternative assignment. The Energy Fair was conducted for the elementary school students and on a limited basis for fellow students (peers). The academic effect was measured by a teacher-designed end-of-unit ecology test, with a subset of the questions on energy use. Psychological effects were measured by a self-esteem questionnaire, which measured both self-esteem and the satisfaction felt about one's self-esteem. Social effects were measured by three semantic differentials, one each for "adults," "peers," and "elementary students." The teacher was interviewed regarding her observations about the project. Written reflections from both the treatment and control groups were coded and analyzed. Pretest results were divided into thirds of high, medium, and low for all variables to search for the possibility of an attribute-treatment interaction. Analysis of covariance was used to reduce the possibility of pretest bias, to test for significant effects, and to test for a level by treatment interaction. Although the posttest means favored the experimental group, no statistically significant difference was found for academic results. No significant effect was found for either of the psychological measures. No change was found for the social results regarding "adults." A statistically significant effect was found for social results in the categories of "elementary students" and "peers." No statistically significant level by treatment interaction was found. Further research on the effects of academic service learning projects is needed at

  7. Preliminary indoor radon and gamma measurements in kindergartens and schools in Bucharest

    International Nuclear Information System (INIS)

    Dumitrescu, A.; Milu, C.; Gheorghe, R.; Vaupotic, J.; Stegnar, P.

    2001-01-01

    A pilot study on indoor radon and gamma dose rates in schools and kindergartens (totalling one hundred buildings) in the Bucharest metropolitan area was performed jointly by the Institute of Public Health, Bucharest, Romania, and the J. Stefan Institute, Ljubljana, Slovenia. Because the geological structure of subsoil over the whole Bucharest area is uniform (a loess platform), the criteria for selecting a kindergarten or a school to be monitored were the age of the building and the building materials. Indoor radon concentrations were measured by a single one-month exposure of radon monitoring device based on etched track detectors in December 2000. Data show a lognormal distribution within the concentration range of 43/477 Bq/m 3 . An arithmetic mean of 146 Bq/m 3 and a geometric mean of 128 Bq/m 3 were obtained. Concomitant with indoor radon levels gamma dose rates were also measured, using thermoluminescent dosimeters. Values ranged from 54 to 100 μSv mo -1 , with a mean value of 74 μSv mo -1 . Having only a single average indoor radon concentration for a winter month, it is not possible to comment on our results, applying the ICRP Publication 65 methodology for indoor radon action level for the general public. Nevertheless, they give a preliminary picture of indoor radon and gamma dose rate levels in schools and kindergartens in Bucharest, and constitute a solid basis on which to design and perform a nation-wide radon survey programme.(author)

  8. Metrological traceability in education: A practical online system for measuring and managing middle school mathematics instruction

    Science.gov (United States)

    Torres Irribarra, D.; Freund, R.; Fisher, W.; Wilson, M.

    2015-02-01

    Computer-based, online assessments modelled, designed, and evaluated for adaptively administered invariant measurement are uniquely suited to defining and maintaining traceability to standardized units in education. An assessment of this kind is embedded in the Assessing Data Modeling and Statistical Reasoning (ADM) middle school mathematics curriculum. Diagnostic information about middle school students' learning of statistics and modeling is provided via computer-based formative assessments for seven constructs that comprise a learning progression for statistics and modeling from late elementary through the middle school grades. The seven constructs are: Data Display, Meta-Representational Competence, Conceptions of Statistics, Chance, Modeling Variability, Theory of Measurement, and Informal Inference. The end product is a web-delivered system built with Ruby on Rails for use by curriculum development teams working with classroom teachers in designing, developing, and delivering formative assessments. The online accessible system allows teachers to accurately diagnose students' unique comprehension and learning needs in a common language of real-time assessment, logging, analysis, feedback, and reporting.

  9. Metrological traceability in education: A practical online system for measuring and managing middle school mathematics instruction

    International Nuclear Information System (INIS)

    Irribarra, D Torres; Freund, R; Fisher, W; Wilson, M

    2015-01-01

    Computer-based, online assessments modelled, designed, and evaluated for adaptively administered invariant measurement are uniquely suited to defining and maintaining traceability to standardized units in education. An assessment of this kind is embedded in the Assessing Data Modeling and Statistical Reasoning (ADM) middle school mathematics curriculum. Diagnostic information about middle school students' learning of statistics and modeling is provided via computer-based formative assessments for seven constructs that comprise a learning progression for statistics and modeling from late elementary through the middle school grades. The seven constructs are: Data Display, Meta-Representational Competence, Conceptions of Statistics, Chance, Modeling Variability, Theory of Measurement, and Informal Inference. The end product is a web-delivered system built with Ruby on Rails for use by curriculum development teams working with classroom teachers in designing, developing, and delivering formative assessments. The online accessible system allows teachers to accurately diagnose students' unique comprehension and learning needs in a common language of real-time assessment, logging, analysis, feedback, and reporting

  10. Measurements of the UVR protection provided by hats used at school.

    Science.gov (United States)

    Gies, Peter; Javorniczky, John; Roy, Colin; Henderson, Stuart

    2006-01-01

    The importance of protection against solar ultraviolet radiation (UVR) in childhood has lead to SunSmart policies at Australian schools, in particular primary schools, where children are encouraged and in many cases required to wear hats at school. Hat styles change regularly and the UVR protection provided by some of the hat types currently used and recommended for sun protection by the various Australian state cancer councils had not been previously evaluated. The UVR protection of the hats was measured using UVR sensitive polysulphone film badges attached to different facial sites on rotating headforms. The sun protection type hats included in this study were broad-brimmed hats, "bucket hats" and legionnaires hats. Baseball caps, which are very popular, were also included. The broad-brimmed hats and bucket hats provided the most UVR protection for the six different sites about the face and head. Legionnaires hats also provided satisfactory UVR protection, but the caps did not provide UVR protection to many of the facial sites. The highest measured UVR protection factors for facial sites other than the forehead were 8 to 10, indicating that, while some hats can be effective, they need to be used in combination with other forms of UVR protection.

  11. Network Security Is Manageable

    Science.gov (United States)

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  12. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  13. How the schools can participate in measuring radon, thoron and radioactive fallout

    International Nuclear Information System (INIS)

    Storruste, A.; Larsen, E.

    1989-12-01

    The Chernobyl accident revealed that people in general have very little knowledge about radioactivity. The general knowledge should be improved rather cheaply and with small efforts through the introduction of a few experiments into the school curriculum. In the report some simple experiments of this kind are described. All the main apparatus needed are an ordinary GM counter and a vacuum cleaner. By using the same method at many schools, the data from the measurement of natural radioactivity variations in the air throughout the year could be usefully collected and collated. This would make the experiments more interesting than an experiments having no other purpose than the learning process itself. 12 refs.; 5 figs

  14. Measuring Listening Comprehension Skills of 5th Grade School Students with the Help of Web Based System

    Science.gov (United States)

    Acat, M. Bahaddin; Demiral, Hilmi; Kaya, Mehmet Fatih

    2016-01-01

    The main purpose of this study is to measure listening comprehension skills of 5th grade school students with the help of web based system. This study was conducted on 5th grade students studying at the primary schools of Eskisehir. The scale used in the process of the study is "Web Based Listening Scale". In the process of the study,…

  15. Managing for Results in America's Great City Schools. A Report of the Performance Measurement and Benchmarking Project, Spring 2008

    Science.gov (United States)

    Council of the Great City Schools, 2008

    2008-01-01

    This report describes statistical indicators developed by the Council of the Great City Schools and its member districts to measure big-city school performance on a range of operational functions in business, finance, human resources and technology. The report also presents data city-by-city on those indicators. This is the second time that…

  16. Managing for Results in America's Great City Schools. A Report of the Performance Measurement and Benchmarking Project

    Science.gov (United States)

    Council of the Great City Schools, 2008

    2008-01-01

    This report describes statistical indicators developed by the Council of the Great City Schools and its member districts to measure big-city school performance on a range of operational functions in business, finance, human resources and technology. The report also presents data city-by-city on those indicators. This is the second time that…

  17. The Development and Scaling of the easyCBM CCSS Middle School Mathematics Measures. Technical Report #1207

    Science.gov (United States)

    Anderson, Daniel; Irvin, P. Shawn; Patarapichayatham, Chalie; Alonzo, Julie; Tindal, Gerald

    2012-01-01

    In the following technical report, we describe the development and scaling of the easyCBM CCSS middle school mathematics measures, designed for use within a response to intervention framework. All items were developed in collaboration with experienced middle school mathematics teachers and were written to align with the Common Core State…

  18. Validation of the Ford Score as a Measure for Predicting the Level of Emotional and Behavioural Problems in Mainstream Schools

    Science.gov (United States)

    Goodman, Anna; Ford, Tamsin

    2008-01-01

    Emotional and behavioural difficulties (EBD) are common in children, and forecasting their prevalence in schools is of interest to both academic researchers and local authorities. Percentage of pupils eligible for free school meals is one measure often used for this purpose. The article presents the first independent validation of a simple…

  19. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  20. Measurements of light at night (LAN) for a sample of female school teachers

    Science.gov (United States)

    Rea, Mark S.; Brons, Jennifer A.; Figueiro, Mariana G.

    2012-01-01

    Epidemiological studies have shown an association between rotating shiftwork and breast cancer (BC) risk. Recently, light at night (LAN) measured by satellite photometry and by self-reports of bedroom brightness has been shown to be associated with BC risk, irrespective of shiftwork history. Importance has been placed on these associations because retinal light exposures at night can suppress the hormone melatonin and/or disrupt circadian entrainment to the local 24-h light-dark cycle. The present study examined whether it was valid to use satellite photometry and self-reports of brightness to characterize light, as it might stimulate the circadian system and thereby affect BC incidence. Calibrated photometric measurements were made at the bedroom windows and in the bedrooms of a sample of female school teachers, who worked regular dayshifts and lived in a variety of satellite-measured sky brightness categories. The light levels at both locations were usually very low and were independent of the amount of satellite-measured light. Calibrated photometric measurements were also obtained at the corneas of these female school teachers together with calibrated accelerometer measurements for seven consecutive days and evenings. Based upon these personal light exposure and activity measurements, the female teachers who participated in this study did not have disrupted light-dark cycles like those associated with rotating shiftworkers who do exhibit a higher risk for BC. Rather, this sample of female school teachers had 24-h light-dark and activity-rest patterns very much like those experienced by dayshift nurses examined in an earlier study who are not at an elevated risk of BC. No relationship was found between the amount of satellite-measured light levels and the 24-h light-dark patterns these women experienced. It was concluded from the present study that satellite photometry is unrelated to personal light exposures as they might affect melatonin suppression and

  1. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    Science.gov (United States)

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  2. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  3. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  4. Low-Level Violence in Schools: Is There an Association between School Safety Measures and Peer Victimization?

    Science.gov (United States)

    Blosnich, John; Bossarte, Robert

    2011-01-01

    Background: Low-level violent behavior, particularly school bullying, remains a critical public health issue that has been associated with negative mental and physical health outcomes. School-based prevention programs, while a valuable line of defense to stave off bullying, have shown inconsistent results in terms of decreasing bullying. This…

  5. [A contribution to the needs assessment of faculty development measures in medical schools].

    Science.gov (United States)

    Raupach, Tobias; Spering, Christopher; Bäumler, Christine; Burckhardt, Gerhard; Trümper, Lorenz; Pukrop, Tobias

    2009-11-15

    In addition to patient care and research activity, physicians working in medical school hospitals serve as teachers in undergraduate medical education. However, teaching qualifications of German university hospital physicians have not been studied in great detail. In January 2009, medical students as well as physicians involved in medical teaching at Göttingen Medical School, Germany, were invited to complete an online survey addressing their views on clinical teachers' educational skills. In addition, physicians' motivation to engage in pedagogical training was assessed. During a 12-day period, 359 students and 126 physicians involved in undergraduate medical education completed the survey. The latter did not feel well prepared for their teaching activities. At the same time, they expressed the willingness to improve their teaching skills. Students felt that, across all instructional methods, teachers would benefit from teacher training programs. In order to improve undergraduate education for future physicians, politicians and local representatives alike must set the scene for the implementation of faculty development measures in German medical schools.

  6. Estimating Turbulence Statistics and Parameters from Lidar Measurements. Remote Sensing Summer School

    DEFF Research Database (Denmark)

    Sathe, Ameya

    This report is prepared as a written contribution to the Remote Sensing Summer School, that is organized by the Department of Wind Energy, Technical University of Denmark. It provides an overview of the state-of-the-art with regards to estimating turbulence statistics from lidar measurements...... configuration. The so-called velocity Azimuth Display (VAD) and the Doppler Beam Swinging (DBS) methods of post processing the lidar data are investigated in greater details, partly due to their wide use in commercial lidars. It is demonstrated that the VAD or DBS techniques result in introducing significant...

  7. Systematic review of self-concept measures for primary school aged children with cerebral palsy.

    Science.gov (United States)

    Cheong, Sau Kuan; Johnston, Leanne M

    2013-10-01

    This study involved a systematic review aimed to identify self-concept measures that provided published psychometrics for primary school aged children (8-12 years) with cerebral palsy (CP). Six electronic databases (PubMed, MEDLINE, CINAHL, PsycINFO, PsycARTICLES and Web of Science) were searched to identify assessments that (1) measured self-concept; (2) in children aged 8-12 years; (3) with CP; (4) with psychometrics available. The Consensus-based Standards for the Selection of Health Measurement Instruments (COSMIN) checklist was used to evaluate psychometric properties and the CanChild Outcome Measure Rating Form was used to evaluate clinical utility. Search yielded 271 papers, of which five met inclusion criteria. These papers reported five measures of self-concept with psychometric properties for the target population: the Rosenberg Self-Esteem Index, Self-Description Questionnaire-I, Self-Perception Profile for Children (original) and two separate modifications of the Self-Perception Profile for Children. Currently, no self-concept measures published in English had sufficient psychometric data for children with CP. The Self-Description Questionnaire-I and the Self-Perception Profile for Children were promising options. Further research is required (a) to determine self-concept construct components important for children with CP and (b) to examine the relative strength, validity, reliability and clinical utility of self-concept measures for the target population. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Preliminary development of a revised version of the School Climate Measure.

    Science.gov (United States)

    Zullig, Keith J; Collins, Rani; Ghani, Nadia; Hunter, Amy A; Patton, Jon M; Huebner, E Scott; Zhang, Jianjun

    2015-09-01

    The School Climate Measure (SCM) was developed and preliminarily validated in 2010 and extended upon in 2013 in response to a dearth of psychometrically sound school climate instruments. This study sought to further validate the SCM on a large diverse sample of Arizona public school adolescents (N = 1,643) with two new domains. The eight original SCM domains (Positive Student-Teacher Relationships, School Connectedness, Academic Support, Order and Discipline, Physical Environment, Social Environment, Perceived Exclusion, and Academic Satisfaction) and two newly developed domains (Parental Involvement and Opportunities for Student Engagement) were subjected to psychometric analysis. The sample was randomly split into exploratory and confirmatory halves and subjected to factor analytic and structural equation modeling techniques. Factor analysis confirmed a 10-factor solution (loadings with absolute values > .40). Item factor loadings ranged from .47 to .95. Coefficient alphas ranged from .70 to .92. Fit statistics indicated a good fitting model (χ2 = 1452.67 [df = 734, p < .01], CFI = .94, TLI = .93, RMSEA = .039). This process eliminated some original SCM items, but the overall SCM increased only from 39 to 42 items with the newly developed domains. This investigation adds to the existing evidence for the SCM and offers support for a more comprehensive version of the SCM. The addition of the Parental Involvement and Opportunities for Student Engagement domains should further enhance the usefulness of the SCM. The SCM can facilitate data-driven decisions and may be incorporated into evidenced-based processes designed to improve important student learning and well-being outcomes. (c) 2015 APA, all rights reserved.

  9. School Library Supplement. Putting Your Library Automation System to Work [and] Using Videodiscs in Research Projects [and] Library Security: What to Look For [and] Expanding Library/Media Services with Media Retrieval [and] How to Network CD-ROMs (and) The School Library Resource Directory.

    Science.gov (United States)

    Karpisek, Marian; And Others

    1995-01-01

    Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…

  10. The security aspect

    International Nuclear Information System (INIS)

    Clutterbuck, R.

    1984-01-01

    The question of the risks of deliberate criminal or politically motivated attack, theft or hijacking of irradiated fuel in transit is discussed. Headings; possible forms of interference; security measures; attractions and limitations as a target. (U.K.)

  11. Use of Income as a Measure of Local Fiscal Ability in the State School Aid Formula. Occasional Paper #10.

    Science.gov (United States)

    Samter, Eugene C.

    It is often suggested that measuring local fiscal ability by full valuation of property per public school pupil is inaccurate and inequitable. One substitute measure proposed is district income per pupil or a combination of district income and property value per pupil. However, using this measure would result in a rise in the aid ratios in only…

  12. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  13. Security, Extremism and Education: Safeguarding or Surveillance?

    Science.gov (United States)

    Davies, Lynn

    2016-01-01

    This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…

  14. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  15. Stochastic Optimization of Supply Chain Risk Measures –a Methodology for Improving Supply Security of Subsidized Fuel Oil in Indonesia

    OpenAIRE

    Adinda Yuanita; Andi Noorsaman Sommeng; Anondho Wijonarko

    2015-01-01

    Monte Carlo simulation-based methods for stochastic optimization of risk measures is required to solve complex problems in supply security of subsidized fuel oil in Indonesia. In order to overcome constraints in distribution of subsidized fuel in Indonesia, which has the fourth largest population in the world—more than 250,000,000 people with 66.5% of productive population, and has more than 17,000 islands with its population centered around the nation's capital only—it is necessary to have a...

  16. Main meal frequency measures in the Health Behaviour in School-aged Children study

    DEFF Research Database (Denmark)

    Pedersen, Trine Pagh; Holstein, Bjørn E; Laursen, Bjarne

    2015-01-01

    OBJECTIVES: To estimate agreement between questionnaire-based frequency measures from the Health Behaviour in School-aged Children study (HBSC) and 7-day 24-h recall measures of breakfast, lunch and evening meals among 11-15-year-olds, and examine whether disagreement between the two methods varied...... for the breakfast measure: per cent agreement 0.70-0.87, kappa 0.43-0.65. Fair agreement for the lunch measure: per cent agreement 0.53-0.84, kappa 0.26-0.54. High per cent agreement for the evening meal measure (0.83-0.95) but poor kappa agreement (0.14-0.19). Being immigrant predicted disagreement between the two...... methods for week day breakfast OR (95 % CI) 2.17 (1.16-4.04) and lunch 2.44 (1.33-4.48). CONCLUSIONS: We found good to moderate agreement between frequency and 7-day 24-h recall measures for breakfast, a fair agreement for lunch and for evening meal the two agreement methods provided different results...

  17. Validity evidence for the measurement of the strength of motivation for medical school.

    Science.gov (United States)

    Kusurkar, Rashmi; Croiset, Gerda; Kruitwagen, Cas; ten Cate, Olle

    2011-05-01

    The Strength of Motivation for Medical School (SMMS) questionnaire is designed to determine the strength of motivation of students particularly for medical study. This research was performed to establish the validity evidence for measuring strength of motivation for medical school. Internal structure and relations to other variables were used as the sources of validity evidence. The SMMS questionnaire was filled out by 1,494 medical students in different years of medical curriculum. The validity evidence for the internal structure was analyzed by principal components analysis with promax rotation. Validity evidence for relations to other variables was tested by comparing the SMMS scores with scores on the Academic Motivation Scale (AMS) and the exhaustion scale of Maslach Burnout Inventory-Student Survey (MBI-SS) for measuring study stress. Evidence for internal consistency was determined through the Cronbach's alpha for reliability. The analysis showed that the SMMS had a 3-factor structure. The validity in relations to other variables was established as both, the subscales and full scale scores significantly correlated positively with the intrinsic motivation scores and with the more autonomous forms of extrinsic motivation, the correlation decreasing and finally becoming negative towards the extrinsic motivation end of the spectrum. They also had significant negative correlations with amotivation scale of the AMS and exhaustion scale of MBI-SS. The Cronbach's alpha for reliability of the three subscales and full SMMS scores was 0.70, 0.67, 0.55 and 0.79. The strength of motivation for medical school has a three factor structure and acceptable validity evidence was found in our study.

  18. Stochastic Optimization of Supply Chain Risk Measures –a Methodology for Improving Supply Security of Subsidized Fuel Oil in Indonesia

    Directory of Open Access Journals (Sweden)

    Adinda Yuanita

    2015-08-01

    Full Text Available Monte Carlo simulation-based methods for stochastic optimization of risk measures is required to solve complex problems in supply security of subsidized fuel oil in Indonesia. In order to overcome constraints in distribution of subsidized fuel in Indonesia, which has the fourth largest population in the world—more than 250,000,000 people with 66.5% of productive population, and has more than 17,000 islands with its population centered around the nation's capital only—it is necessary to have a measurable and integrated risk analysis with monitoring system for the purpose of supply security of subsidized fuel. In consideration of this complex issue, uncertainty and probability heavily affected this research. Therefore, this research did the Monte Carlo sampling-based stochastic simulation optimization with the state-of-the-art "FIRST" parameter combined with the Sensitivity Analysis to determine the priority of integrated risk mitigation handling so that the implication of the new model design from this research may give faster risk mitigation time. The results of the research identified innovative ideas of risk based audit on supply chain risk management and new FIRST (Fairness, Independence, Reliable, Sustainable, Transparent parameters on risk measures. In addition to that, the integration of risk analysis confirmed the innovative level of priority on sensitivity analysis. Moreover, the findings showed that the new risk mitigation time was 60% faster than the original risk mitigation time.

  19. New Hampshire Public Schools Facilities Adequacy and Condition Study Report.

    Science.gov (United States)

    2000

    This report presents New Hampshire survey data, methodology, and the survey instrument used to measure a school's physical quality and educational effectiveness. The survey instrument collects data in the following categories: school site; building; building systems; building maintenance; building safety and security; space adequacy; and building…

  20. Public Schools

    Data.gov (United States)

    Department of Homeland Security — This Public Schools feature dataset is composed of all Public elementary and secondary education in the United States as defined by the Common Core of Data, National...