WorldWideScience

Sample records for securing library technology

  1. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  2. The Security Research of Digital Library Network

    Science.gov (United States)

    Zhang, Xin; Song, Ding-Li; Yan, Shu

    Digital library is a self-development needs for the modern library to meet the development requirements of the times, changing the way services and so on. digital library from the hardware, technology, management and other aspects to objective analysis of the factors of threats to digital library network security. We should face up the problems of digital library network security: digital library network hardware are "not hard", the technology of digital library is relatively lag, digital library management system is imperfect and other problems; the government should take active measures to ensure that the library funding, to enhance the level of network hardware, to upgrade LAN and prevention technology, to improve network control technology, network monitoring technology; to strengthen safety management concepts, to prefect the safety management system; and to improve the level of security management modernization for digital library.

  3. Mobile technologies for every library

    CERN Document Server

    Gleason, Ann Whitney

    2015-01-01

    If you are wondering what mobile technology adoption means for your library or how to get started, Mobile Technologies for Every Library will answer your questions! This book will detail the opportunities and pitfalls in using mobile technology in libraries. It will also address platforms, options, security, and best practices for starting new mobile services programs or improving existing services. Gleason previews many useful apps for libraries. Web links and resources are also included.

  4. RFID: the security for library

    OpenAIRE

    Pattanaik, Bibhuti-Bhusan; Pattnaik, Babita

    2007-01-01

    Radio frequency identification (RFID) technology, a surveillance system promises to relieve repetitive strain injury, and improving safety, security, productivity, accuracy and convenience for communities working in various sectors. This Dedicated short-range communication (DSRC) system has been used in library for multiple purposes; such as automatic identification, tracking and management of material flow. It has also provided an additional advantage to Bar-code technology. In this article ...

  5. Building a Secure Library System.

    Science.gov (United States)

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  6. Library Security Management: An Introduction

    Directory of Open Access Journals (Sweden)

    Erland Kolding Nielsen

    2002-03-01

    Full Text Available During the last week of January 2001, the Royal Library suffered serious thefts in both its special reading rooms for maps and for manuscripts and rare books. Precious maps were removed from folio editions and smuggled out by a thief who was something of a magician. For years the Royal Library has been one of the most effectively secured buildings housing cultural assets in Denmark. Nevertheless, this incident happened and apparently could happen. The thefts were discovered the same day, but the thief had become suspicious and did not reappear over the next few days as expected. However, because the theft had been filmed on security cameras in the reading room, we had very good photographs of the thief. After days of hard work we were able to discover from the security film how the theft had been carried out and how the items had been smuggled out of the reading room. On the second day after the incident, I warned my fellow directors in the Nordic national libraries and in a number of university libraries with historical collections. Nevertheless, the following week the thief or his accomplice visited Helsinki University Library, and later we discovered that they had been in the Royal Library in The Hague at almost the same time, as well as some months earlier, and in the Royal Library in Stockholm on numerous occasions from the autumn of 2000 onwards.

  7. SECURING DIGITIZED LIBRARY CIRCULATORY SYSTEM

    African Journals Online (AJOL)

    user

    In this paper, we improved on these baselines related works by developing a secure system with a large and robust database and ensured privacy of patron's information by encrypting the detail of every registered user alongside sending notifications to patrons specifically for library circulation operations. This was achieved ...

  8. Science & Technology Digital Library

    OpenAIRE

    Solodovnik, Iryna

    2014-01-01

    This document contains information on the activities carried out within the project Science & Technology Digital Library and in particular, it describes the Metadata Core Reference Model. Metadata are strategic for semantic interoperability to and, from the repository. Metadata are essential for available and safe management of digital objects, and for their sustainability and preservation. For these reasons, the project needs to define a specific metadata model. The purpose of this document ...

  9. How Much Security Does Your Library Need?

    Science.gov (United States)

    Banerjee, Kyle

    2003-01-01

    Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…

  10. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  11. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  12. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  13. Minnesota: Library Automation and Technology in Libraries.

    Science.gov (United States)

    Feye-Stukas, Jan

    1996-01-01

    Provides an overview of library automation in Minnesota. Topics include regional public library systems; library automation vendors; multitype library systems; postsecondary and academic libraries; state government libraries; the Internet; telecommunications and statewide online system legislation and funding; and state library agency involvement…

  14. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  15. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  16. Iowa DOT library services, collection & technology assessment.

    Science.gov (United States)

    2014-07-01

    Assesses the impact of library services on research projects, proposes methods to improve the impact of : library services on research projects, assesses current library technology systems and proposes upgrades, : assesses current library collection ...

  17. Optimizing use of library technology.

    Science.gov (United States)

    Wink, Diane M; Killingsworth, Elizabeth K

    2011-01-01

    In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes optimizing the use of library technology.

  18. Security and crime challenges in academic libraries in Nigeria ...

    African Journals Online (AJOL)

    Security and prevention of crimes in academic libraries is essential library duties for librarians to achieve. Due to security breaches in academic libraries, users sometimes are not able to get information materials needed and this makes the library ineffective in satisfying users' information needs. The paper, therefore ...

  19. Security Risks Management in Selected Academic Libraries in Osun ...

    African Journals Online (AJOL)

    The survival of a library depends to a large extent on how secured its collections are. Security of collections constitutes a critical challenge facing academic libraries in Nigeria. It is against this background that this study investigated the security risks management in selected academic libraries in Osun State, Nigeria.

  20. Security issues and service provision in Laz Otti Memorial Library ...

    African Journals Online (AJOL)

    Security issues and service provision in Laz Otti Memorial Library, Babcock University, Ogun State, Nigeria. ... Lagos Journal of Library and Information Science ... The objective was to identify security issues faced by the library, their causes and those materials vulnerable to theft and also proffer solutions to insecurity of ...

  1. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  2. Information Technology and Security

    OpenAIRE

    Denning, Dorothy E.

    2003-01-01

    in Grave New World: Global Dangers in the 21st Century (Michael Brown ed.), Georgetown Press, 2003. (.pdf of prepublication version) This paper examines key trends and developments in information technology, and the implications of those developments on stability and security. Focus is on cyber threats to computer networks, including information theft and sabotage, and acts that disrupt or deny services. Seven trend areas are examined: ubiquity, mobility, hacking tools, perform...

  3. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  4. Technological tools for library user education: one library's experience.

    Science.gov (United States)

    Kerns, Stephanie C

    2007-01-01

    In today's world, library users are confronted with almost too many options for using information because of the ubiquitousness of technology. Yet, libraries can harness the power of the same technologies to help users find the information they need at the time it is needed. The tools described in this article represent a starting point for librarians looking for technologies that are easy to use, inexpensive, and have a reasonable learning curve. Technologies addressed include classroom technologies such as audience response systems and Web-based technologies, including Web tutorials and screencasting. These technologies enhance and offer flexibility and variety in many educational settings.

  5. Security and Crime Challenges in Academic Libraries in Nigeria

    African Journals Online (AJOL)

    Security and Crime Challenges in Academic Libraries in Nigeria. G. U. Oyedum Ph.D., A.A Sanni, & I.O.Udoakang. Page 128. Libraries are institutions set up to cater for the educational, cultural, research, recreational and information needs of their users. Libraries have the main objectives of being entrusted with the ...

  6. Technology and the contemporary library

    Directory of Open Access Journals (Sweden)

    Peter Reed

    2015-07-01

    Full Text Available There are many challenges provided by contemporary higher education (HE that impact all aspects and services provided. This article considers some of the challenges and developments in HE that might be reflected in, and impact upon, the library service. New challenges have been created by developments in technology. Massive open online courses (MOOCs have shone a spotlight onto the university, leading it to open up access to content and resources. The buildings that maintain very traditional ideologies are evolving, as are the services they provide. As today’s students meander through their university life, we seek to understand them and their motives in greater detail. The author discusses these issues and focuses on people, on technology and on partnership.

  7. Information Technology in Libraries. A Pakistani Perspective.

    Science.gov (United States)

    Mahmood, Khalid

    This book presents an overview of the present status of the use of library automation hardware and software in Pakistan. The following 20 articles are included: (1) "The Status of Library Automation in Pakistan"; (2) "Promoting Information Technology in Pakistan: the Netherlands Library Development Project"; (3) "Library…

  8. Library security better communication, safer facilities

    CERN Document Server

    Albrecht, Steve

    2015-01-01

    Through the methods outlined in this book, Albrecht demonstrates that effective communication not only makes library users feel more comfortable but also increases staff morale, ensuring the library is place where everyone feels welcome.

  9. Food security, technology, and techniques

    OpenAIRE

    Ghani, Saud; Aljabri, Hareb; El Kharbotly, Ali

    2017-01-01

    CENG held a seminar on “Food Security, Technology and Techniques” on November 9, in collaboration with the Ministry of Municipality and Environment (MME). The event aimed to discuss the main techniques that should be followed to enhance food security through investing in technology.

  10. Intelligent library systems: artificial intelligence technology and library automation systems

    OpenAIRE

    Bailey, Jr., Charles W.

    1991-01-01

    Artificial Intelligence (AI) encompasses the following general areas of research: (1) automatic programming, (2) computer vision, (3) expert systems, (4) intelligent computer-assisted instruction, (5) natural language processing, (6) planning and decision support, (7) robotics, and (8) speech recognition. Intelligent library systems utilize artificial intelligence technologies to provide knowledge-based services to library patrons and staff. This paper examines certain key aspects of AI th...

  11. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  12. SECURING DIGITIZED LIBRARY CIRCULATORY SYSTEM | Olaniyi ...

    African Journals Online (AJOL)

    The results of testing and evaluation of the developed system showed that the surface area and position of the tag from RFID reader affects the response of the RFID system for improved library circulatory service delivery. The widespread application of the developed system on smart library circulation unit would improve the ...

  13. The Women Who Drive Library Technology

    Science.gov (United States)

    Miller, Eva

    2007-01-01

    No matter their generation or library setting, the women who find technology and libraries a compelling combination share certain qualities. The women interviewed here are confident, skilled communicators and risktakers, people who seek challenges and prefer working in teams. They revel in new gadgetry, but they never forget it is all about a…

  14. Educational Technologies in Health Science Libraries: Teaching Technology Skills

    Science.gov (United States)

    Hurst, Emily J.

    2014-01-01

    As technology rapidly changes, libraries remain go-to points for education and technology skill development. In academic health sciences libraries, trends suggest librarians provide more training on technology topics than ever before. While education and training have always been roles for librarians, providing technology training on new mobile devices and emerging systems requires class creation and training capabilities that are new to many. To appeal to their users, many health sciences librarians are interested in developing technology-based classes. This column explores the question: what skills are necessary for developing and teaching technology in an academic health sciences library setting? PMID:24528269

  15. Educational technologies in health sciences libraries: teaching technology skills.

    Science.gov (United States)

    Hurst, Emily J

    2014-01-01

    As technology rapidly changes, libraries remain go-to points for education and technology skill development. In academic health sciences libraries, trends suggest librarians provide more training on technology topics than ever before. While education and training have always been roles for librarians, providing technology training on new mobile devices and emerging systems requires class creation and training capabilities that are new to many librarians. To appeal to their users, many health sciences librarians are interested in developing technology-based classes. This column explores the question: what skills are necessary for developing and teaching technology in an academic health sciences library setting?

  16. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  17. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  18. Security Problems of Mobile Technologies

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The article provides an overview of security problems which exist in the mobile devices. The main technologies aimed to protect the phones from various types of attacks are considered. The authors justify the necessity of developing new improved tools and methods to ensure the safety of such devices.

  19. Towards improving security measures in Nigeria University Libraries ...

    African Journals Online (AJOL)

    A questionnaire designed by the researchers titled “Towards Improving Security Measures in Nigerian University Libraries (TISMINUL)” was used to collect the needed data. The questionnaire was designed in two parts. Part one was to gather information on the size of collection, frequency of stock taking and book loss.

  20. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  1. Public libraries, information society and technology: communication

    Directory of Open Access Journals (Sweden)

    Elsa Barber

    2001-01-01

    Full Text Available The research team focuses in the influence that Argentinian public libraries (popular and public have with library automation and public services oriented to the use of information technologies, and the acquisition of communitarian information skills within the information society. The methodology consists of a survey already successfully approved in previous investigations by the research team (UBACYT FI013 and TF06. The questionnaire focuses on related variables. On one hand, the variables were related to libraries automation processes (equipment, information systems,working modules, retrospective conversion, digitization, networks,and so on. And on the other hand, with given information technologies services (access to networks and documents in every media, Web navigation assistance, information technology local server, services to minorities, and so on. Data would be gathered with specific applications from the social sciences field. The final stage would be to study specific aspects of the automation processes of the libraries surveyed, in order to verify the reciprocal relationship between the automation level reached. And subsequently, to examine the likelihood of establishing new services that respond to the community information trends within the information technology and telecommunications development context.

  2. Exploring Information Security and Shared Encrypted Spaces in Libraries

    Directory of Open Access Journals (Sweden)

    Keith Engwall

    2015-07-01

    Full Text Available Libraries are sensitive to the need to protect patron data, but may not take measures to protect the data of the library. However, in an increasingly collaborative online environment, the protection of data is a concern that merits attention. As a follow-up to a new patron privacy policy, the Oakland University William Beaumont Medical Library evaluated information security tools for use in day-to-day operations in an attempt to identify ways to protect private information in communication and shared storage, as well as a means to manage passwords in a collaborative team environment. This article provides an overview of encryption measures, outlines the Medical Library’s evaluation of encryption tools, and reflects on the benefits and challenges in their adoption and use.

  3. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  4. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  5. The National Resource Library for Science and Technology in Sweden: A Nordic model of cooperating technology libraries

    Science.gov (United States)

    Lagar, Gunnar

    1994-01-01

    The scope of this presentation is to give a state-of-the-art report on the present situation of Nordic technology libraries, to elaborate on a plan for national resource libraries in Sweden, and to share how the Royal Institute of Technology Library in Stockholm (KTHB) has fostered a network of cooperating libraries in order to optimize government funding for the system of resource libraries.

  6. The Adoption of Cloud Computing Technology for Library Services ...

    African Journals Online (AJOL)

    The study investigated the rationales for the adoption of cloud computing technology for library services in NOUN Library. Issues related to the existing computer network available in NOUN library such as LAN, WAN, rationales for the adoption of cloud computing in NOUN library such as the need to disclose their collections ...

  7. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  8. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  9. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ...: NASA is revising the NASA FAR Supplement (NFS) to update requirements related to Information Technology... Security clause. However, due to the critical importance of protecting the Agency's Information Technology...) Insert the clause at 1852.204-76, Security Requirements for Unclassified Information Technology Resources...

  10. Computer and Network Security in Small Libraries: A Guide for Planning.

    Science.gov (United States)

    Williams, Robert L.

    This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…

  11. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  12. Utilization of Information and Communication Technology in Coordination Between the National Library with the Provincial Library

    Directory of Open Access Journals (Sweden)

    Dimas Gammayani

    2018-01-01

    Full Text Available Changes are rapidly occur in this world, especially developments in the field of information and communication technology. Man must be able to adjust quickly to keep up. Developments in information and communication technology has made it easier for people in work. Utilization of information and communication technology are expected to make work performed by humans is more effective and efficient. National Library of Indonesia mandated by Law No. 43 of 2007 as an adviser to all types of libraries throughout Indonesia. In carrying out the task, the National Library should coordinate with local government including the provincial government, represented by the provincial library which can be said to represent the provincial government in the affairs of the library. National Library of Indonesia in coordination with the provincial library has been facilitated by information and communication technology such as telephone, fax and internet. In addition, coordination can also be done through conventional correspondency or direct face to face. This study tried to define which communication system that is commonly used by the National Library of Indonesia when coordinating with the provincial library and the reasons that lie behind them. The method used in this research is descriptive with a participatory approach, the researchers and respondents are equal and shared a mutual cooperation. This research indicates that face-to-face coordination is more preferred, because face-to-face coordination offers a social and economical benefit. Keywords: library, national library, provincial library, utilization technology

  13. Library Crimes and Technology | Hogan-Bassey | Nigerian Libraries

    African Journals Online (AJOL)

    Nigerian Libraries. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 34, No 2 (2000) >. Log in or Register to get access to full text downloads.

  14. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  15. School Library Media Specialists Inform Technology Preparation of Library Science Students: An Evidence-Based Discussion

    Science.gov (United States)

    Snyder, Donna L.; Miller, Andrea L.

    2009-01-01

    What is the relative importance of current and emerging technologies in school library media programs? In order to answer this question, in Fall 2007 the authors administered a survey to 1,053 school library media specialists (SLMSs) throughout the state of Pennsylvania. As a part of the MSLS degree with Library Science K-12 certification, Clarion…

  16. Marine data security based on blockchain technology

    Science.gov (United States)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  17. Mobile technology for expansion of service range medan public library

    Science.gov (United States)

    Siregar, A. R.; Dewiyana, H.

    2018-03-01

    The information society, especially library users, expects an easier and faster way to get information and share knowledge. The library also implements the best way to provide the best service and the easiest way to disseminate and share information with its users. One technology that allows libraries more closely with their users is mobile technology. This paper aims to determine the basic conditions of mobile technology services and mobile services most needed library users, as well as constraints faced by libraries and users in the application of mobile technology. This paper will help libraries to develop better M-Library services in expanding the reach of library services. Methods of data collection were conducted through surveys through questionnaires, interviews, and direct observation. The results of the use of mobile technology applications in libraries bring great advantages to provide better library services and to improve accessibility of library resources in the easiest way, but due to lack of funds, lack of skills and lack of staff, many libraries are unable to provide this service with very successful.

  18. RFID Technology Implementation in Two Libraries in New Delhi

    Science.gov (United States)

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  19. Shock Waves Science and Technology Library

    CERN Document Server

    2012-01-01

    This book, as a volume of the Shock Wave Science and Technology Reference Library, is primarily concerned with the fundamental theory of detonation physics in gaseous and condensed phase reactive media. The detonation process involves complex chemical reaction and fluid dynamics, accompanied by intricate effects of heat, light, electricity and magnetism - a contemporary research field that has found wide applications in propulsion and power, hazard prevention as well as military engineering. The seven extensive chapters contained in this volume are: - Chemical Equilibrium Detonation (S. Bastea and LE Fried) - Steady One-Dimensional Detonations (A Higgins) - Detonation Instability (HD Ng and F Zhang) - Dynamic Parameters of Detonation (AA Vasiliev) - Multi-Scaled Cellular Detonation (D Desbordes and HN Presles) - Condensed Matter Detonation: Theory and Practice (C Tarver) - Theory of Detonation Shock Dynamics (JB Bdzil and DS Stewart) The chapters are thematically interrelated in a systematic descriptive appro...

  20. Shock wave science and technology reference library

    CERN Document Server

    2009-01-01

    This book is the second of several volumes on solids in the Shock Wave Science and Technology Reference Library. These volumes are primarily concerned with high-pressure shock waves in solid media, including detonation and high-velocity impact and penetration events. Of the four extensive chapters in this volume, the first two describe the reactive behavior of condensed phase explosives, - Condensed-Phase Explosives: Shock Initiation and Detonation Phenomena (SA Sheffield and R Engelke) - First Principles Molecular Simulations of Energetic Materials at High-Pressures (F Zhang, S Alavi, and TK Woo), and the remaining two discuss the inert, mechanical response of solid materials. - Combined Compression and Shear Plane Waves (ZP Tang and JB Aidun), and - Dynamic Fragmentation of Solids (D Grady). All chapters are each self-contained, and can be read independently of each other. They offer a timely reference, for beginners as well as professional scientists and engineers, on the foundations of detonation phenomen...

  1. Shock wave science and technology reference library

    CERN Document Server

    2009-01-01

    This book, as a volume of the Shock Wave Science and Technology Reference Library, is primarily concerned with detonation waves or compression shock waves in reactive heterogeneous media, including mixtures of solid, liquid and gas phases. The topics involve a variety of energy release and control processes in such media - a contemporary research field that has found wide applications in propulsion and power, hazard prevention as well as military engineering. The six extensive chapters contained in this volume are: - Spray Detonation (SB Murray and PA Thibault) - Detonation of Gas-Particle Flow (F Zhang) - Slurry Detonation (DL Frost and F Zhang) - Detonation of Metalized Composite Explosives (MF Gogulya and MA Brazhnikov) - Shock-Induced Solid-Solid Reactions and Detonations (YA Gordopolov, SS Batsanov, and VS Trofimov) - Shock Ignition of Particles (SM Frolov and AV Fedorov) Each chapter is self-contained and can be read independently of the others, though, they are thematically interrelated. They offer a t...

  2. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  3. Application of LOD Technology in German Libraries and Archives

    OpenAIRE

    Dong Jie

    2017-01-01

    [Purpose/significance] Linked Open Data (LOD) has been widely used in large industries, as well as non-profit organizations and government organizations. Libraries and archives are ones of the early adopters of LOD technology. Libraries and archives promote the development of LOD. Germany is one of the developed countries in the libraries and archives industry, and there are many successful cases about the application of LOD in the libraries and archive...

  4. MODERN INFORMATION TECHNOLOGIES FOR MODERN LIBRARY

    Directory of Open Access Journals (Sweden)

    O. M. Drozd

    2013-01-01

    Full Text Available The results of upgrading Automated Library Information System BIT-2000u at the Y. KolasCentral Science Library of the National Academy of Sciences of Belarus by means of RFIDtechnologies are considered.

  5. IFLA General Conference, 1986. Special Libraries Division. Section: Science and Technology Libraries. Papers.

    Science.gov (United States)

    International Federation of Library Associations and Institutions, The Hague (Netherlands).

    Papers on science and technology libraries which were presented at the 1986 International Federation of Library Associations (IFLA) conference include: (1) "Online Information Service of the Japan Information Center of Science and Technology" (Ryuko Igarashi, Japan); (2) "A View from the Chip--The Influence of Information…

  6. Labeling process for RFID technology implementation in library of Centro Universitário UNIVATES

    Directory of Open Access Journals (Sweden)

    Nalin Ferreira da Silveira

    2016-05-01

    Full Text Available The Radio-Frequency Identification (RFID Technology has emerged as a tool for automation, security and management of library collections. This article describes the initial process of RFID labels deploying in the Library of Centro Universitário Univates (UNIVATES, describing human and computer resources involved. The time between planning and execution of recording and labeling occurred from November 2013 to March 2014. We conclude that the preparation process of the collection to receive this technology is prolonged and costly, however with the appropriate planning, and using resources of information technology allow greater reliability and agility.

  7. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  8. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  9. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... a major component of economic growth and innovation in other areas of society and the economy. As the President's. Council of Advisors on Science and. Technology acknowledged in ... America's security, economy, and quality of life, The .... Sharing will greatly improve the ability of the security agencies ...

  10. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  11. Effect of Technology on Librarians in Academic Libraries in Nigeria ...

    African Journals Online (AJOL)

    Social media as typified in library 2.0 model are increasingly becoming part of ... specific reference to performance, responsibility and perception about learning new technology as well as to know the sources of ... How do librarians working in academic libraries in Delta State perceive the impact of technology in relation to ...

  12. Fundamentals of Library Automation and Technology. Participant Workbook.

    Science.gov (United States)

    Bridge, Frank; Walton, Robert

    This workbook presents outlines of topics to be covered during a two-day workshop on the fundamentals for library automation. Topics for the first day include: (1) Introduction; (2) Computer Technology--A Historical Overview; (3) Evolution of Library Automation; (4) Computer Hardware Technology--An Introduction; (5) Computer Software…

  13. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  14. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  15. Interactions between libraries and technology over the past 30 years

    DEFF Research Database (Denmark)

    Greifeneder, Elke; Seadle, Michael; Lynch, Clifford

    2012-01-01

    Purpose – The purpose of this paper is to look back on the last 30 years of technology development for libraries. Design/methodology/approach – The paper presents an interview that took place at the American Library Association Annual Meeting in Anaheim, California. Findings – The paper reveals...... libraries can help the public. In the early days of the internet libraries played an enormous uncredited role in teaching the adult population about the it. There are some opportunities like that now, and one place where we are starting to see signs of it is digital preservation, not as libraries doing...

  16. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  17. User survey at Waterford Institute of Technology Libraries: How a traditional approach to surveys can inform library service delivery

    OpenAIRE

    Hayden, Helen; O'Brien, Terry; Ó Rathaille, Maoilíosa

    2005-01-01

    This paper describes a comprehensive user survey carried out in an Irish higher education academic library (Waterford Institute of Technology library service) as part of a strategic initiative to engage with library users.

  18. Search Engine Technology and Digital Libraries: Libraries Need to Discover the Academic Internet

    OpenAIRE

    Lossau, Norbert

    2004-01-01

    This article is the revised and elaborated version of a presentation that was delivered at the invitation of the American Digital Library Federation (DLF) at their Spring Forum meeting in New Orleans (http://www.diglib.org/forums/Spring2004/springforum04abs.htm). It will be followed by "Search engine technology and digital libraries: Moving from theory to praxis" as a collaborative article from this author and Friedrich Summann, Head of IT at Bielefeld University Library. With the development...

  19. Web 2.0 and libraries impacts, technologies and trends

    CERN Document Server

    Parkes, Dave

    2010-01-01

    In a world where computing power, ubiquity and connectivity create powerful new ways to facilitate learning, this book examines how librarians and information professionals can utilize emerging technologies to expand service and resource delivery. With contributions from leading professionals, including lecturers, librarians and e-learning technologists, this bookl explores strategic approaches for effectively implementing, living with, and managing revolutionary technological change in libraries.Explores the impact of the social and technological aspects of Web 2.0 on librarie

  20. What Library Managers Know about Marketing: A Study of Brazilian Geoscience and Mineral Technology Libraries.

    Science.gov (United States)

    Amaral, Sueli Angelica do

    1992-01-01

    Describes results of a survey of geoscience and mineral technology libraries in Brazil conducted to determine the level of knowledge and adoption of marketing techniques among library managers. A lack of knowledge of marketing was verified, and recommendations for improving the situation are suggested. (12 references) (LRW)

  1. IFLA General Conference, 1985. Division on Special Libraries. Section on Science and Technology Libraries. Papers.

    Science.gov (United States)

    International Federation of Library Associations, The Hague (Netherlands).

    Papers on science and technology libraries which were presented at the 1985 International Federation of Library Associations (IFLA) conference include: (1) "UAP (Universal Availability of Publications) and User Training for Categories of Grey Literature" (Dieter Schmidmaier, Mining Academy Freiberg, East Germany); (2) "Resource…

  2. Application of LOD Technology in German Libraries and Archives

    Directory of Open Access Journals (Sweden)

    Dong Jie

    2017-12-01

    Full Text Available [Purpose/significance] Linked Open Data (LOD has been widely used in large industries, as well as non-profit organizations and government organizations. Libraries and archives are ones of the early adopters of LOD technology. Libraries and archives promote the development of LOD. Germany is one of the developed countries in the libraries and archives industry, and there are many successful cases about the application of LOD in the libraries and archives. [Method/process] This paper analyzed the successful application of LOD technology in German libraries and archives by using the methods of document investigation, network survey and content analysis. [Result/conclusion] These cases reveal in the traditional field of computer science the relationship among research topics related to libraries and archives such as artificial intelligence, database and knowledge discovery. Summing up the characteristics and experience of German practice can provide more reference value for the development of relevant practice in China.

  3. Technology and Management in Library and Information Services.

    Science.gov (United States)

    Lancaster, F. W.; Sandore, Beth

    This books deals with the logical intersection of technology and management in the context of libraries and other information centers. It is divided into the following sections: Effects of Technology on the Institution and its Management; Effects of Technology on Services and Users; and Special Issues in the Management of Technology. Chapters are…

  4. Management of library and archival security from the outside looking in

    CERN Document Server

    O'Neill, Robert K

    2014-01-01

    Providing a substantive approach to the issue, Management of Library and Archival Security: From the Outside Looking In gives librarians and collection directors practical and helpful suggestions for developing policies and procedures to minimize theft. In addition, this text prepares you to deal with the aftermath of a robbery or natural disaster that destroys priceless materials. Through expert opinions and advice, Management of Library and Archival Security will teach you how to protect and secure invaluable collections and the finances invested in them.In addition, Management of Library an

  5. National Security Technology Incubator Operations Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  6. Factors Underlying Technology Adoption in Academic Libraries in Kuwait

    Science.gov (United States)

    Al-Fadhli, Meshal; Corrall, Sheila; Cox, Andrew

    2016-01-01

    The study analyzed factors shaping adoption of technology in academic libraries in Kuwait. The research was based on interviews conducted with library directors, staff, and users, combined with observation and document analysis. A major aspect of the Kuwaiti context was a relative lack of financial restraints and an enthusiasm for technology…

  7. Effect of technology on librarians in academic libraries in Nigeria ...

    African Journals Online (AJOL)

    The purpose of this study is to investigate the effect of technology on librarians working in academic libraries in Nigeria with particular reference to Delta State. The descriptive survey design was adopted. The twelve (12) tertiary institutions libraries in Delta State were used for the study. The purposive sampling technique ...

  8. Adaptive technologies for library and information services for ...

    African Journals Online (AJOL)

    This study is an assessment of the use of adaptive technologies in library and information services for physically challenged in special education schools of Kaduna state. The researcher used survey research design for the study; the population for the study comprises library staff and students (physically challenged) of ...

  9. Addressing social resistance in emerging security technologies.

    Science.gov (United States)

    Mitchener-Nissen, Timothy

    2013-01-01

    In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus. Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake.

  10. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  11. Center for Coastline Security Technology, Year 3

    Science.gov (United States)

    2008-05-01

    Figure 2.6.8: Close-Up Photograph of RPUUV Tail Section. Figure 2.6.9: Force and moments applied on a hydrofoil . Figure 2.6.10: The NACA 21016... hydrofoil profile. Florida Atlantic University 4/28/08 Page 10 Center for Coastline Security Technology Year Three-Final Report Figure...as a 3D wing with a NACA 21016 hydrofoil profile (Figure 2.6.10) held by 3 cylinders (Figure 2.6.8). Center for Coastline Security Technology Year

  12. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  13. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  14. Management and innovation of small science and technology libraries

    International Nuclear Information System (INIS)

    Yang Shumei

    2014-01-01

    This paper describes the new conception of management and service of small science and technology libraries in research and development institutions (R and D institutions), in the light of characteristics of the R and D institution, this paper gives the small science and technology libraries the new and advanced knowledge of management and service. Moreover, this paper gives instructions on knowledge management and service innovation in future practice. (author)

  15. Transforming Knowledge Creation: An Action Framework for Library Technology Diversity

    Directory of Open Access Journals (Sweden)

    Barbara I. Dewey

    2015-04-01

    Full Text Available This paper will articulate an action framework for library technology diversity consisting of five dimensions and based on the vision for knowledge creation, the academic library’s fundamental vision. The framework focuses on increasing diversity for library technology efforts based on the desire for transformation and inclusiveness within and across the dimensions. The dimensions are people, content and pedagogy, embeddedness and the global perspective, leadership, and the 5th dimension – bringing it all together.

  16. Application on Internet of Things Technology Using in Library Management

    Science.gov (United States)

    Liu, Xueqing; Sheng, Wenwen

    Following the computer, Internet and mobile communication network, the Internet of Things (IOT) will bring a new development of information industry, and moreover is a global technology revolution that is bound to have a profound impact on the economic development and social life. This paper analyzes the key technology and working principle of IOT, its development at home and abroad, its application in the library management, and proposes its development direction in the field of library management and promotion programs.

  17. Current Technology Trends for School Library Media Specialists

    Directory of Open Access Journals (Sweden)

    Leticia Ekhaml

    2003-03-01

    Full Text Available An overview of some of the current technology trends used in classroom instruction and school library media centers in provided in this article such as the use of handheld electronic organizers, CD recorders, digital video cameras, and interactive whiteboards. The article offers some suggestions or ideas on how to acquire new technologies to school library media centers that are low in budgetary funds.

  18. Report on International Roundtable Meeting on Collection Security held at the British Library

    Directory of Open Access Journals (Sweden)

    Andy Stephens

    2008-09-01

    Full Text Available Anonymised report on some of the issues raised at an international roundtable on collection security of thirteen major research libraries and national libraries from Europe and North America. Recurring themes of case studies included: 1 perpetrator profiling; 2 relations with the criminal justice system; 3 systems; 4 looking out; 5 aftermath.

  19. Tracing technology in the Association of Academic Health Sciences Libraries.

    Science.gov (United States)

    Guard, J Roger; Peay, Wayne J

    2003-04-01

    From the beginning of the association, technology and the Association of Academic Health Sciences Libraries (AAHSL) have been intertwined. Technology was the focus of one of the first committees. Innovative applications of technology have been employed in the operations of the association. Early applications of mini-computers were used in preparing the Annual Statistics. The association's use of network communications was among the first in the country and later applications of the Web have enhanced association services. For its members, technology has transformed libraries. The association's support of the early development of Integrated Advanced Information Management Systems (IAIMS) and of its recent reconceptualization has contributed to the intellectual foundation for this revolution.

  20. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  1. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  2. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  3. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  4. Wearable technology smart watches to Google Glass for libraries

    CERN Document Server

    Bruno, Tom

    2015-01-01

    Emerging devices are placing powerful computing abilities into the wardrobes of consumers through wearable technology which combines fashion and function in new and exciting ways. The most recognizable of these emerging gadgets is Google Glass. Wearable Technology: Smart Watches to Google Glass for Libraries provides a comprehensive overview of the current wearable technology landscape, the types of devices and functionality available, the benefits and limitations of this type of technology, and how you can make use of it in yo

  5. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  6. Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask

    Directory of Open Access Journals (Sweden)

    Alex Caro

    2016-04-01

    Full Text Available This article is based on an independent cyber security risk management audit for a public library system completed by the authors in early 2015 and based on a research paper by the same group at Clark University in 2014. We stress that while cyber security must include raising public knowledge in regard to cyber security issues and resources, and libraries are indeed the perfect place to disseminate this knowledge, librarians are also in a unique position as the gatekeepers of information services provided to the public and should conduct internal audits to ensure our content partners and IT vendors take cyber security as seriously as the library and its staff. One way to do this is through periodic reviews of existing vendor relationships. To this end, the authors created a simple grading rubric you can adopt or modify to help take this first step towards securing your library data. It is intended to be used by both technical and non-technical staff as a simple measurement of what vendor agreements currently exist and how they rank, while at the same time providing a roadmap for which security features or policy statements the library can or should require moving forward.

  7. Use of assistive technologies in academic libraries: a survey.

    Science.gov (United States)

    Tripathi, Manorama; Shukla, Archana

    2014-01-01

    The present article attempts to highlight the use of assistive technologies in academic libraries in India, the United Kingdom, the United States, and Canada. It dwells upon the use and importance of assistive technologies in general and their use for visually challenged learners in particular. Further, it gives suggestions for implementing assistive technologies in academic libraries for making visually challenged students self-reliant learners in accomplishing their academic and research pursuits. The present study adopted convenience sampling for collecting the data, which was collected between December 15, 2012 and January 18, 2013.

  8. Libraries and Information Services in a Post-Technological Society

    OpenAIRE

    Line, Maurice B.

    1981-01-01

    Technological imperatives will produce major changes in society in the future, as they have in the past. Post-technological society will affect the way we work, where we live, and how we spend our leisure. Changes in educational and research directions and in publishing and information delivery will affect the role and shape of the library of the future.

  9. So That's a Book...Advancing Technology and the Library.

    Science.gov (United States)

    DeBuse, Raymond

    1988-01-01

    Reviews key developments in information technologies, and describes the possible convergence of these developments in the creation of a new publishing and communication medium. The impact of this technology on the organization and role of libraries is discussed. (4 references) (CLB)

  10. Security of Heterogeneous Content in Cloud Based Library Information Systems Using an Ontology Based Approach

    Directory of Open Access Journals (Sweden)

    Mihai DOINEA

    2014-01-01

    Full Text Available As in any domain that involves the use of software, the library information systems take advantages of cloud computing. The paper highlights the main aspect of cloud based systems, describing some public solutions provided by the most important players on the market. Topics related to content security in cloud based services are tackled in order to emphasize the requirements that must be met by these types of systems. A cloud based implementation of an Information Library System is presented and some adjacent tools that are used together with it to provide digital content and metadata links are described. In a cloud based Information Library System security is approached by means of ontologies. Aspects such as content security in terms of digital rights are presented and a methodology for security optimization is proposed.

  11. Library macro-environment: New technological and economic rules

    Directory of Open Access Journals (Sweden)

    Karmen Štular-Sotošek

    2003-01-01

    Full Text Available Fast and flexible adaptation to changes in the macro-environment is also crucial for libraries, which have to review them, respond to them and become a part of them. Consequently, the application of marketing science and tools helps libraries to find out how to survive in the competitive world and how to become better and stronger. The article, which draws from marketing, economic and information disciplines, introduces the main principles in the technological and economic environment of libraries and finds the knowledge about these disciplines to be most crucial for successful management of modern libraries, especially on the pretentious publishing market and on the market of information suppliers. Within the technological and economic environment, the cooperation is the only logical solution, which benefits the producers of information services and products as well as libraries. The following text finds that libraries will achieve long-term success and will be proactive in developing partnerships only by using relationship marketing. This relatively new approach offers libraries new ways for successful and long-term management of alliances between partners.

  12. Infrared: A Key Technology for Security Systems

    Directory of Open Access Journals (Sweden)

    Carlo Corsi

    2012-01-01

    Full Text Available Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due to the coolers avoidance, low cost, and, overall, completely integrable with Silicon technology FPAs, especially designed and tailored for specific applications, smart sensors, has really been impacted with revolutionary and new ideas and system concepts in all the infrared fields, especially for security applications. Lastly, the advent of reliable Infrared Solid State Laser Sources, operating up to the Long Infrared Wavelength Band and the new emerging techniques in Far Infrared Submillimeter Terahertz Bands, has opened wide and new areas for developing new, advanced security systems. A review of all the items with evidence of the weak and the strong points of each item, especially considering possible future developments, will be reported and discussed.

  13. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  14. International Association of Technological University Libraries (IATUL: Promoting Science and Technology Librarianship in the Changing Library Landscape International Association of Technological University Libraries (IATUL: Promoting Science and Technology Librarianship in the Changing Library Landscape

    Directory of Open Access Journals (Sweden)

    Maitrayee Ghosh

    2007-12-01

    Full Text Available International Association of Technological University Libraries (IATUL has been in the forefront of providing leadership to information professionals and promoting science and Technology librarianship in today's changing library landscape. The present article is an attempt to comprehend the present status of IATUL and analyze the activities and contribution it has made to overcome the range of challenges facing by tertiary level Technological libraries throughout the world. The SWOT analysis method is used to assess the achievements of IATUL, failures and ascertain constraints being faced in this internet age. The author relied on web sites as well as ephemeral material such as minutes, annual reports, newsletters, and memoranda to construct this article. Meeting and Interview with IATUL present and past presidents and other office bearers of the associations provided useful sources of information. It is also attempted to provide relevant information for those interested to join IATUL for professional development.

  15. Safeguarding cultural properties security for museums, libraries, parks, and zoos

    CERN Document Server

    Layne, Stevan P

    2014-01-01

    Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic s

  16. Resource sharing in libraries concepts, products, technologies, and trends

    CERN Document Server

    Breeding, Marshall

    2014-01-01

    Supplementing your local collection through resource sharing is a smart way to ensure your library has the resources to satisfy the needs of your users. Marshall Breeding's new Library Technology Report explores technologies and strategies for sharing resources, helping you streamline workflows and improve resource-sharing services by covering key strategies like interlibrary loan, consortial borrowing, document delivery, and shared collections. You'll also learn about such trends and services as:OCLC WorldCat Resource Sharing, and other systems that facilitate cooperative, reciprocal lendingS

  17. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  18. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  19. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  20. International Association of Technological University Libraries (IATUL: Promoting Science and Technology Librarianship in the Changing Library Landscape

    Directory of Open Access Journals (Sweden)

    Maitrayee Ghosh

    2013-11-01

    Full Text Available International Association of Technological University Libraries (IATUL has been in the forefront of providing leadership to information professionals and promoting science and Technology librarianship in today's changing library landscape. The present article is an attempt to comprehend the present status of IATUL and analyze the activities and contribution it has made to overcome the range of challenges facing by tertiary level Technological libraries throughout the world. The SWOT analysis method is used to assess the achievements of IATUL, failures and ascertain constraints being faced in this internet age. The author relied on web sites as well as ephemeral material such as minutes, annu- al reports, newsletters, and memoranda to construct this article. Meeting and Interview with IATUL present and past presidents and other office bearers of the associations provided useful sources of information. It is also attempted to pro- vide relevant information for those interested to join IATUL for professional development.

  1. Female Public Library Patrons Value the Library for Services, Programs, and Technology. A Review of: Fidishun, Dolores. “Women and the Public Library: Using Technology, Using the Library.” Library Trends 56.2 (2007: 328-43.

    Directory of Open Access Journals (Sweden)

    Virginia Wilson

    2009-03-01

    Full Text Available Objective – This study attempts to give insight into why and how women use the public library and information technology, and how they learned to use the technology.Design – Qualitative survey.Setting – The research took place at the Chester County Library in Exton, Pennsylvania, USA.Subjects – One hundred and eighty-four female library patrons 18 years and older.Methods – An anonymous qualitative survey was handed out to all patrons at the ChesterCounty Library 18 years of age and older who came into the library on four separate days and times. Times were chosen to obtain a good representation of library patrons, and included daytime, evening, and weekend hours. The survey consisted of questions about library use, information sought, information seeking behaviour, technology used, and how the respondents learned to use the technology. The surveys were collated and spreadsheets were created that reported answers to yes/no and other data questions. Word documents facilitated the listing of more qualitative answers. The data were analyzed using a thematic content analysis to find themes and patterns that emerged to create grounded theory. In thematic content analysis, “the coding scheme is based on categories designed to capture the dominant themes in a text (Franzosi 184. There is no universal coding scheme, and this method requires extensive pre-testing of the scheme (Franzosi 184. Grounded theory “uses a prescribed set of procedures for analyzing data and constructing a theoretical model” from the data (Leedy and Ormrod 154.Main Results – The survey asked questions about library use, reasons for library use, using technology, finding information, and learning to use online resources. A total of 465 surveys were distributed and 329 were returned. From the surveys returned, 184 were from female patrons, 127 from male patrons, and 18 did not report gender. The data for this article are primarily taken from the 184 female

  2. Use of Information Communication Technology (ICT) and Library Operation: An Overview

    OpenAIRE

    Bhoi, Narendra Kumar

    2017-01-01

    This paper discusses the different dimension of the ICTs. It gives an awareness of technology in library and why there is a need to understand the use of ICT in the library for rendering enhanced library services and information to users. The current study highlights the areas where ICT can be applied. Basically, the paper explains different technologies and their use in the library operation. How library services are prompted with the use of technology like RemoteXs, RFID Technology, QR Code...

  3. School Libraries and Technology: A Sourcebook.

    Science.gov (United States)

    Broadbent, Marianne; Schmidmaier, Dagmar

    Assembled to provide an introduction to computer and communications technology, systems analysis, and networking for school librarians, this booklet brings together articles, addresses, and teaching materials prepared by the compilers for journals, conferences, and a series of continuing education courses for school librarians in Australia. The…

  4. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  5. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  6. Application of Information Technology in Nigerian special libraries in ...

    African Journals Online (AJOL)

    Also some of the problems impeding promotion of the use of the information technology in the libraries were highlighted as well as the consequences on effective information storage retrieval and delivery. Four research questions were constructed to serve as a guide. Data were collected through questionnaire, interviews ...

  7. Implementation of RFID Technology in University of Pune Library

    Science.gov (United States)

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  8. Managing Technological Change in Libraries and Information Services.

    Science.gov (United States)

    Klobas, Jane E.

    1990-01-01

    Examines factors to be considered in the management of technological change in libraries and information services. The organizational climate for change is discussed, and factors to consider when developing a strategy for introducing a new product, service, or system are described, including leadership, goals, political processes, marketing, and…

  9. The Effect of Information Technology on Library Acquisitions ...

    African Journals Online (AJOL)

    Information technology has eliminated many routine tasks and increased speed in the acquisition of materials. Reduced library budget is forcing the acquisitions staff to be on the alert to new free online information and ensure that user access to information is increased, promoted and enhanced. Free electronic sources ...

  10. Implications of information technology on the training of library and ...

    African Journals Online (AJOL)

    The advancement in information and communication technology has brought a lot of changes not only on the library and information services but also on the roles and expectations of the professionals. As a librarian one is expected to do more and more with fewer and fewer people. Therefore, it is important that there is a ...

  11. Advanced technologies: Trends and implications for security

    International Nuclear Information System (INIS)

    Shaw, A.

    1990-01-01

    As the world moves towards the close of the twentieth century, three technological trends will strongly influence security. In order of importance they are: first, the increasing globalization of the ability to develop and use high technology, much of which has both civilian and military applications; secondly, the broad dissemination of militarily-relevant technology world-wide; and thirdly, the continued development by the United States and the USSR (and a few other nations) of advanced technology for military applications. The military balance between the super-Powers and their allies has been strongly rooted in advancing military technology. Great changes in technology have resulted in adjustments -mostly in limited aspects such as the armour/ anti-armour balance - but have not caused it to change wildly. This seems likely to remain the case for the foreseeable future. There are arguments that Western technology has been a prime causative factor behind Soviet willingness to engage in negotiations to reduce forces. They claim that fear of the Strategic Defense Initiative is behind progress in the Strategic Arms Reduction Talks, and that perceived Western mastery of the technology for systems combining quick reaction, deep strike and high kill probabilities led the Soviet Union to reassess its potential for a successful land campaign in Europe. If current arms control negotiations are successful, the momentum is maintained, and other political changes take hold, the military balance could be taken to a point where ft would not be very sensitive to technological change. One should be aware that the arms control negotiations are very complex, primarily because of technological issues, and we should not yet bank on it all working out well. If it fails, the military technical competition will heat up again. Even under a strict arms control regime we can expect the competition to continue as each side seeks to develop counters to what ft sees as the other side

  12. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  13. Discussion on construction of scientific and technological digital library in nuclear industry

    International Nuclear Information System (INIS)

    Yin Huilan

    2010-01-01

    With the rapid development of digital and network technology, traditional libraries have been unable to meet the needs of the times. Digital libraries will gradually take the place of traditional libraries. Under the circumstances, how will the libraries of the enterprises in nuclear industry face this transformation? This paper gives the brief descriptions and comparative analyses in the four aspects: the definition of the digital library, the meaning of nuclear scientific and technological digital library, the characteristics of the digital library, and major problems in the construction of nuclear scientific and technological digital library that should be solved. Therefore, setting up the digital library is very important. At the same time, it's very necessary and urgent for the libraries of the enterprises in nuclear industry to establish nuclear scientific and technological digital library. (author)

  14. National Security in the Nuclear Age. A Proposed Booklist and Public Education Ideas for Libraries.

    Science.gov (United States)

    Dane, Ernest B.

    A bibliography on national security in the nuclear age is divided into three sections. The first section describes a proposal calling for the compilation of a balanced and up-to-date collection of books and other materials on this issue to be included in all U.S. public libraries. Also discussed are selection criteria for the book list, project…

  15. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  16. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  17. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  18. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  19. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    OpenAIRE

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of information technology in the past, present and expectations for the future. For each period, the security requirements and solutions are discussed, It is made clear that the developments in information tech...

  20. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  1. Input from Key Stakeholders in the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  2. Securing PCs and Data in Libraries and Schools: A Handbook with Menuing, Anti-Virus, and Other Protective Software.

    Science.gov (United States)

    Benson, Allen C.

    This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…

  3. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  4. DO Get Technical! Using Technology in Library Instruction

    Directory of Open Access Journals (Sweden)

    Nicole Eva

    2011-12-01

    Full Text Available Today’s post-secondary students are digital natives. Much has been said and written about how to reach this generation, and the consensus seems to be that we need to meet them on their turf. In this session presented at WILU 2011 in Regina, SK, two librarians from the University of Lethbridge shared their experiences with using technology to engage students in library instruction. The hands-on session introduced some simple tools librarians can learn quickly and apply to spice up their instruction with technology. These include creating online animated videos using Xtranormal, a low-cost tool way to create polished and humourous videos to introduce or summarize key information literacy concepts; and adding interactive polling to PowerPoint presentations using a tool called Poll Everywhere, which is an effective way to instantly engage students in instruction using the web or web-enabled devices. Interactive polling eliminates many of the challenges of using clickers which are prevalent in many post-secondary library instruction environments. The presenters also discussed how they have experimented with wikis to encourage active learning and student collaboration in a series of library instruction sessions. Wikis allow for free and paperless student participation in knowledge creation in an online forum. Finally, they demonstrated how they have used Skype to deliver library instruction at a distance, including the use of the screen sharing feature. The presenters stressed the ease of use of these free or low-cost tools to improve classroom engagement and add interest to sessions.

  5. Supporting Individual Library Patrons with Information Technologies: Emerging One-to-One Library Services on the College or University Campus.

    Science.gov (United States)

    Keating, John J., III; Hafner, Arthur W.

    2002-01-01

    Describes business techniques for mass marketing, where information technologies are used to target discrete individuals or groups and promote customer interaction. Considers the applicability of business concepts to academic library service, including uniquely identifying patrons, issues of privacy, focusing on the most valuable library services,…

  6. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  7. Investigating the issue of copyright and security measures in digital libraries

    Directory of Open Access Journals (Sweden)

    Sedigheh Ahmadi Fasih

    2013-11-01

    Full Text Available During the past few years, digital libraries have been the primary source of retrieving necessary information. IT helps many scholars have the access to recently published value added researches around the world. However, information security and copyright concerns are among the most important issues and there must be good rules and regulation to protect authors against any sort of copyright violation. In this paper, we present an empirical investigation to find out about the status of copyright issues in one of Iranian libraries. The proposed study of this paper designs a questionnaire in Likert scale and distributes it among 96 librarian experts. Cronbach alpha is equal to 0.76, which is well above the minimum acceptable level. The results of our investigation indicate that although expert believe the status of copyright is in desirable level when the level of significance is five percent, there are some concerns on some issues. In other words, experts believed that all copyrights are not well protected and digital libraries do not follow governmental rules and regulation on fully protecting authors’ rights. In addition, experts believed that the security of sources available on digital libraries is not well protected.

  8. U.S. Public Libraries and the Use of Web Technologies, 2012. A Closer Look

    Science.gov (United States)

    Wanucha, Meghan; Hofschire, Linda

    2013-01-01

    In 2008, researchers at the Library Research Service (LRS) undertook the "U.S. Public Libraries and the Use of Web Technologies" study, with the intent to document the use of various Internet technologies on the websites of public libraries throughout the nation (Lietzau, 2009). The results of that study set a baseline for the adoption…

  9. 77 FR 1942 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-01-12

    ... Technology Advisory Committee (HSSTAC) AGENCY: Department of Homeland Security Science and Technology... for appointment to Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The... serving on the Homeland Security Science and Technology Advisory Committee (HSSTAC). The HSSTAC gives...

  10. Massachusetts Institute of Technology Security Studies Program

    Science.gov (United States)

    2006-01-01

    incoming SSP Directors. Among other notables who have called Belmont home are Vannevar Bush, Winslow Homer, Talcott Parsons , the John Birch Society...Researchers 15 Affiliates 26 Seminar Series 33 Special Events 34 Field Trip 36 Publications 41 SSP Teaching 42 Courses 48 Professional Education 50 SSP...STUDIES PROGRAM MIT SECURITY STUDIES PROGRAM SECURITY STUDIES PROGRAM 1 he Security Studies Program (SSP) is a graduate level research and educational

  11. Development of the self-service library : the case of the Central technological library at the University of Ljubljana

    Directory of Open Access Journals (Sweden)

    Matjaž Žaucer

    2000-01-01

    Full Text Available The article describes the importance of self-service in libraries. Individual phases of library services and probability for self-service are analysed. The author gives the ex¬ample of the Central Technological Library at the University of Ljubljana, which made some improvements based on diagnostic evaluation and detection of poor performance of some services. Advantages, disadvantages, and economical aspect of self-service loan unit are given. The application of self-renewals and information on loan transactions by phone, with interactive voice response, is described. The library also plans to enable the self-pick up of books ordered by phone. Some ideas for further develop¬ment of self-service in the library and its impact on the new library building plans are mentioned.

  12. Technology for small and one-person libraries a LITA guide

    CERN Document Server

    Erlandson, Rene J

    2013-01-01

    Written for librarians, library staff, and administrators at libraries serving populations of 15,000 or less, this LITA guide shows how to successfully develop, implement, sustain, and grow technology initiatives.

  13. Nuclear Technologies Secure Food For Future

    International Nuclear Information System (INIS)

    2012-01-01

    use of such techniques to protect plants and animals against disease and pests means many more farmers can produce enough food to feed their own families and to sell on markets. Ultimately, fewer people go hungry. The IAEA collaborates with the United Nations Food and Agriculture Organization (FAO) in providing support through a joint division in Vienna. ''While our profile is modest, the size of our footprint is significant,'' said Qu Liang, Director of the Joint FAO/IAEA Division of Nuclear Techniques. ''We are putting the benefits of tried and tested nuclear technologies into the hands of farmers, particularly small producers in poorer countries, to improve their food security and livelihood.'' ''The assistance is driven by advanced technologies,'' Liang added. ''But what we are delivering has to be appropriate to farmers' needs. That means crops that can flourish in changing and often harsher conditions, pest control without a chemical legacy and protection for livestock.'' The Scientific Forum will be opened by the IAEA Director General and ministers from Indonesia, Kenya and Vietnam. FAO Director General Graziano da Silva will deliver a video address. The Forum will address IAEA activities in the fields of food production, food protection and food safety. Each session features a panel of experts who will present and discuss the benefits of nuclear techniques in food and agriculture. A moderator will guide the discussions. (IAEA)

  14. Promoting Economic Security through Information Technology ...

    African Journals Online (AJOL)

    The problem of economic insecurity is a global threat to national security. In Nigeria today, we have witness a lot of national security issues that risks the continued existence of the country as one indivisible political entity with many calling for disintegration. Hitherto, many terrorist networks have sprang up in many parts of ...

  15. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... Abstract. The problem of economic insecurity is a global threat to national security. In Nigeria today, we have witness a lot of national security issues that risks the continued existence of the country as one indivisible political entity with many calling for disintegration. Hitherto, many terrorist networks have ...

  16. ENDF/B-VII.0: Next Generation Evaluated Nuclear Data Library for Nuclear Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Chadwick, M B; Oblozinsky, P; Herman, M; Greene, N M; McKnight, R D; Smith, D L; Young, P G; MacFarlane, R E; Hale, G M; Haight, R C; Frankle, S; Kahler, A C; Kawano, T; Little, R C; Madland, D G; Moller, P; Mosteller, R; Page, P; Talou, P; Trellue, H; White, M; Wilson, W B; Arcilla, R; Dunford, C L; Mughabghab, S F; Pritychenko, B; Rochman, D; Sonzogni, A A; Lubitz, C; Trumbull, T H; Weinman, J; Brown, D; Cullen, D E; Heinrichs, D; McNabb, D; Derrien, H; Dunn, M; Larson, N M; Leal, L C; Carlson, A D; Block, R C; Briggs, B; Cheng, E; Huria, H; Kozier, K; Courcelle, A; Pronyaev, V; der Marck, S

    2006-10-02

    biases in fast systems are largely removed; (c) ENDF/B-VI.8 good agreement for simulations of highly enriched uranium assemblies is preserved; (d) The underprediction of fast criticality of {sup 233,235}U and {sup 239}Pu assemblies is removed; and (e) The intermediate spectrum critical assemblies are predicted more accurately. We anticipate that the new library will play an important role in nuclear technology applications, including transport simulations supporting national security, nonproliferation, advanced reactor and fuel cycle concepts, criticality safety, medicine, space applications, nuclear astrophysics, and nuclear physics facility design. The ENDF/B-VII.0 library is archived at the National Nuclear Data Center, BNL. The complete library, or any part of it, may be retrieved from www.nndc.bnl.gov.

  17. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  18. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  19. Effectiveness of Information Technology Infrastructure Library Process Implementations by Information Technology Departments within United States Organizations

    Science.gov (United States)

    Persinger, Jon F.

    2010-01-01

    This research study examined whether the overall effectiveness of the Information Technology Infrastructure Library (ITIL) could be predicted by measuring multiple independent variables. The primary variables studied included the number of ITIL process modules adopted and the overall ITIL "maturity level." An online survey was used to…

  20. Reaching the Adult Learner: Teaching Information Technology Infrastructure Library (ITIL) to Practicing Technology Managers

    Science.gov (United States)

    Adade, Anthony Kwasi

    2012-01-01

    A great deal has been written about adult learning in terms of approaches and strategies. However, very little has been published on best practices for teaching Information Technology Infrastructure Library ® (ITIL) certification course to IT professionals. This dearth of research, along with five years of experience teaching the course sparked my…

  1. Evaluation of the central libraries information security management at governmental universities located in Tehran, according to the international standard ISO/IEC 27002

    Directory of Open Access Journals (Sweden)

    Milad Malekolkalami

    2014-02-01

    Full Text Available This study assessed the evaluation of information security management status in central Libraries of governmental universities located in Tehran, according to ISO / I.E.C. 27002. Research method applied for the study is descriptive Survey and a questionnaire was used for collecting information. The questionnaire was distributed between the 74 central library managers of governmental universities in Tehran according to the recent list on the website of Ministry of Science, Research and Technology, that includes 39 components based on 11 indicators of the standard ISO/ I.E.C. 27002. Analysis of data has been done by using both descriptive and inferential statistics by Microsoft Excel 2007and SPSS statistical softwares. The results of research showed that the mean for libraries in 11 indexes are as follows: The mean for the first index, Security policy, is 3.91 , in the second index, organization of information security, is 4.23, in the third index, asset security management, is 4.38, in the fourth index, Human Resources Security management, is 4, in the fifth index, physical and environment Security management, is 4.07, in the sixth index, operations management and communications, is 4.15, in the Seventh index, access controls management, is 4.38, in the eighth index, information system acquisition, development and maintenance, is 3.92, in the ninth index, information security incident management, is 3.84, in the tenth index, business continuity management, is 3.46, in the eleventh index, compliance, is 3.69 that match with the standard ISO / IEC. 27002. The results of Research shown that totally mean for standard ISO/I.E.C. 27002 in the field of information security management in the central libraries, is 4 being in a good condition and there is no significant differences between the performance of the Central libraries of the governmental Universities in Tehran, since It is not observed significant difference between them in the field of

  2. End-user satisfaction analysis on library management system unnes using technology acceptance model towards national standard of integrated library

    Science.gov (United States)

    Hardyanto, W.; Purwinarko, A.; Adhi, M. A.

    2018-03-01

    The library which is the gate of the University should be supported by the existence of an adequate information system, to provide excellent service and optimal to every user. Library management system that has been in existence since 2009 needs to be re-evaluated so that the system can meet the needs of both operator and Unnes user in particular, and users from outside Unnes in general. This study aims to evaluate and improve the existing library management system to produce a system that is accountable and able to meet the needs of end users, as well as produce a library management system that is integrated Unnes. Research is directed to produce evaluation report with Technology Acceptance Model (TAM) approach and library management system integrated with the national standard.

  3. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... the Department of Homeland Security (DHS), Science and Technology Directorate, 1120 Vermont Avenue NW... Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of Homeland Security...

  4. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  5. Analysis and Comparison on Novel Sensor Network Security Access Technology

    Directory of Open Access Journals (Sweden)

    Ping LIU

    2014-01-01

    Full Text Available The article introduces against technical defects of traditional network access control system, detail NAC, NAP, UAC and TNC four kinds of new network security access technology, and this article analyzes and compares them. Security framework for wireless sensor networks SPINS defines the mechanism and algorithm of complete and effective in confidentiality, point-to-point message authentication, integrity, authentication, broadcast authentication.

  6. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after crop production. The impacts of global change on food security and the potential impacts of global markets for food and land are also briefly discussed. Nigerian Journal of Technological Research ...

  7. Mobile technology and academic libraries innovative services for research and learning

    CERN Document Server

    Canuel, Robin

    2017-01-01

    In seventeen chapters ranging from A Mobile-First Library Site Redesign to Mobile Technology Support for Field Research to Virtual Reality Library Environments, Mobile Technology and Academic Libraries explores how librarians around the world are working to adapt their spaces, collections, teaching, and services to the new possibilities presented by mobile technology. This is a detailed and thorough examination of technology that's emerging now and how to incorporate it into your library to help the students and researchers of both today and tomorrow.

  8. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  9. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  10. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  11. "A Really Nice Spot": Evaluating Place, Space, and Technology in Academic Libraries

    Science.gov (United States)

    Khoo, Michael J.; Rozaklis, Lily; Hall, Catherine; Kusunoki, Diana

    2016-01-01

    This article describes a qualitative mixed-method study of students' perceptions of place and space in an academic library. The approach is informed by Scott Bennett's model of library design, which posits a shift from a "book-centered" to a technology supported "learning centered" paradigm of library space. Two surveys…

  12. U.S. Public Libraries and the Use of Web Technologies. A Closer Look

    Science.gov (United States)

    Lietzau, Zeth

    2009-01-01

    The use of interactive web technologies on public library web sites in the United States has been a topic of much discussion in recent years, and a shift in certain types of user services is underway. Terms like "Web 2.0" and even "Library 2.0" have become common in library literature and at conferences as those on the early…

  13. The Science, Engineering and Technology Career Library Corner. Final report, February 1, 1995--January 31, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Cole, P.R.

    1996-03-01

    A grant was made to install and pilot-test the Science, Engineering and Technology (SET) Career Library Corner at the New York Hall of Science. The SET Career Library Corner is located in a multi-media library setting where visitors can explore careers in a quiet, uninterrupted environment, in contrast to the original installation designed as a museum floor exhibit.

  14. ENDF/B-VII.0: Next Generation Evaluated Nuclear Data Library for Nuclear Science and Technology

    Science.gov (United States)

    Chadwick, M. B.; Obložinský, P.; Herman, M.; Greene, N. M.; McKnight, R. D.; Smith, D. L.; Young, P. G.; MacFarlane, R. E.; Hale, G. M.; Frankle, S. C.; Kahler, A. C.; Kawano, T.; Little, R. C.; Madland, D. G.; Moller, P.; Mosteller, R. D.; Page, P. R.; Talou, P.; Trellue, H.; White, M. C.; Wilson, W. B.; Arcilla, R.; Dunford, C. L.; Mughabghab, S. F.; Pritychenko, B.; Rochman, D.; Sonzogni, A. A.; Lubitz, C. R.; Trumbull, T. H.; Weinman, J. P.; Brown, D. A.; Cullen, D. E.; Heinrichs, D. P.; McNabb, D. P.; Derrien, H.; Dunn, M. E.; Larson, N. M.; Leal, L. C.; Carlson, A. D.; Block, R. C.; Briggs, J. B.; Cheng, E. T.; Huria, H. C.; Zerkle, M. L.; Kozier, K. S.; Courcelle, A.; Pronyaev, V.; van der Marck, S. C.

    2006-12-01

    agreement for simulations of thermal high-enriched uranium assemblies is preserved; (d) The underprediction of fast criticality of 233,235U and 239Pu assemblies is removed; and (e) The intermediate spectrum critical assemblies are predicted more accurately. We anticipate that the new library will play an important role in nuclear technology applications, including transport simulations supporting national security, nonproliferation, advanced reactor and fuel cycle concepts, criticality safety, fusion, medicine, space applications, nuclear astrophysics, and nuclear physics facility design. The ENDF/B-VII.0 library is archived at the National Nuclear Data Center, BNL, and can be retrieved from www.nndc.bnl.gov.

  15. ENDF/B-VII.0: Next Generation Evaluated Nuclear Data Library for Nuclear Science and Technology

    International Nuclear Information System (INIS)

    Chadwick, M.B.; Oblozinsky, P.; Herman, M.

    2006-01-01

    agreement for simulations of thermal high-enriched uranium assemblies is preserved; (d) The underprediction of fast criticality of 233,235 U and 239 Pu assemblies is removed; and (e) The intermediate spectrum critical assemblies are predicted more accurately. We anticipate that the new library will play an important role in nuclear technology applications, including transport simulations supporting national security, nonproliferation, advanced reactor and fuel cycle concepts, criticality safety, fusion, medicine, space applications, nuclear astrophysics, and nuclear physics facility design. The ENDF/B-VII.0 library is archived at the National Nuclear Data Center, BNL, and can be retrieved from www.nndc.bnl.gov

  16. The influence of the latest information and communication technology on the libraries in the primary schools

    Directory of Open Access Journals (Sweden)

    Franceska Žumer

    2000-01-01

    Full Text Available The article presents the information and communication equipment in primary school libraries and the end usage of the above mentioned technology. A detailed research, including 109 primary schools throughout Slovenia, was performed. The research showed that the schools do not have the basic information technology needed to perform the latest and up-to-date services. Not a single library, included in the research, has a completely automated library collection. But the percentage of libraries, which do not perform automated lending and do not use the various offered possibilites of the already existing technology, automated collections and on-line library, is significantly lower. A systematic solution of the present situation is needed. Only in this way will school libraries be successfully included in the educational system of schools and will be able to perform the library inter-subject information knowledge and information literacy programs in the new nine-year primary school.

  17. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  18. Applying New Network Security Technologies to SCADA Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  19. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  20. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  1. Dynamically-Loaded Hardware Libraries (HLL) Technology for Audio Applications

    DEFF Research Database (Denmark)

    Esposito, A.; Lomuscio, A.; Nunzio, L. Di

    2016-01-01

    In this work, we apply hardware acceleration to embedded systems running audio applications. We present a new framework, Dynamically-Loaded Hardware Libraries or HLL, to dynamically load hardware libraries on reconfigurable platforms (FPGAs). Provided a library of application-specific processors,...

  2. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  3. The Implementation of Web 2.0 Technology for Information Literacy Instruction in Thai University Libraries

    Science.gov (United States)

    Sawetrattanasatian, Oranuch

    2014-01-01

    Web 2.0 technology has drawn much attention recently as a fascinating tool for Information Literacy Instruction (ILI), especially in academic libraries. This research was aimed to investigate the implementation of Web 2.0 technology for ILI in Thai university libraries, in terms of information literacy skills being taught, types of Web 2.0…

  4. U.S. Public Libraries and the Use of Web Technologies, 2010. A Closer Look

    Science.gov (United States)

    Lietzau, Zeth; Helgren, Jamie

    2011-01-01

    It's well known that technology is changing at an increasingly rapid pace and that many public libraries throughout the United States are attempting to adopt new technologies to better reach their patrons. In trade journals, blogs, and at library conferences, professionals in the field have continually discussed the best methods for using web…

  5. Organizational Influences in Technology Adoption Decisions: A Case Study of Digital Libraries

    Science.gov (United States)

    Oguz, Fatih

    2016-01-01

    The purpose of this study was to understand the organizational level decision factors in technology adoption in the context of digital libraries. A qualitative case study approach was used to investigate the adoption of a specific technology, XML-based Web services, in digital libraries. Rogers' diffusion of innovations and Wenger's communities of…

  6. Applications of a Case Library of Technology Integration Stories for Teachers

    Science.gov (United States)

    Wang, Feng-Kwei; Jonassen, David H.; Strobel, Johannes; Cernusca, Dawn

    2003-01-01

    Stories are the most natural form of communication and learning among humans. In this paper, we describe how we have designed and implemented an case library of technology integration stories to support pre-service and in-service teachers learning how to integrate technologies into their teaching. The case library was built using the artificial…

  7. Public security in Brazil: Efficiency and technological gaps

    Directory of Open Access Journals (Sweden)

    Francisco Soares de Lima

    2017-01-01

    Full Text Available This article analyzes the technical efficiency, the Total Factor Productivity (TFP and the technological gap in public security services in Brazilian States. The order—m frontier is used for results estimation. The TFP variation is built by decomposing the Malmquist productivity index into technical efficiency, scale efficiency and technological variation. More than 50% of the federative units were considered technically inefficient. Out of the 27 federative units, 12 presented a positive total productivity while all others suffered total productivity losses. Productivity gains in public security are more related to scale aspects than to efficiency improvements and technological progress.

  8. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  9. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  10. Reflection on the talent structure of knowledge-service oriented nuclear technology library

    International Nuclear Information System (INIS)

    Zhang Xue; Zhang Ruiping

    2010-01-01

    Nuclear technology library is the only authoritative organization in collection of nuclear technology literatures.It has exceptional advantage and a large number of customers with great requirement. With promotion of network and digitization of information resource, new situation is posed before nuclear technology library-transforming from traditional library to knowledge-service oriented library. In order to carry on knowledge service effectively and conveniently, a variety of talents are essential. So establishing a talent team with high quality and complete specialities is the fundamental guarantee. Based on a great deal research and discussion, requirements for establishment of a talent team are put forward in the paper and suggestion are present: 5 basic specialized talents are required in nuclear technology library, including organization and management talent, basic operation talent, search service talent, technology application talent, information development talent. (authors)

  11. M-libraries 4 from margin to mainstream : mobile technologies transforming lives and libraries

    CERN Document Server

    Ally, Mohamed

    2014-01-01

    A brand new edition of the highly successful M-Libraries series, this draws together cutting-edge international contributions from the leading authorities in the field. It explores the variety of work that libraries are doing across the world to deliver resources to users via mobile and hand-held devices.

  12. 78 FR 17219 - Homeland Security Science and Technology Advisory Committee Meeting Cancellation

    Science.gov (United States)

    2013-03-20

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY Homeland Security Science and Technology Advisory Committee Meeting Cancellation AGENCY: Science... Meeting for Homeland Security Science and Technology Advisory Committee (HSSTAC). SUMMARY: The meeting of...

  13. Novel technology for enhanced security and trust in communication networks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz

    2011-06-01

    A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.

  14. ShockWave science and technology reference library

    CERN Document Server

    2007-01-01

    This book is the first of several volumes on solids in the Shock Wave Science and Technology Reference Library. These volumes are primarily concerned with high-pressure shock waves in solid media, including detonation, high-velocity impact, and penetration. Of the eight chapters in this volume three chapters survey recent, exciting experimental advances in - ultra-short shock dynamics at the atomic and molecular scale (D.S. More, S.D. Mcgrane, and D.J. Funk), - Z accelerator for ICE and Shock compression (M.D. Knudson), and - failure waves in glass and ceramics (S.J. Bless and N.S. Brar). The subsequent four chapters are foundational, and cover the subjects of - equation of state (R. Menikoff), - elastic-plastic shock waves (R. Menikoff), - continuum plasticity (R. M. Brannon), and - numerical methods (D. J. Benson). The last chapter, but not the least, describes a tour de force illustration of today’s computing power in - modeling heterogeneous reactive solids at the grain scale (M.R. Baer). All chapters a...

  15. Audit Layanan Teknologi Informasi Berbasis Information Technology Infrastructure Library (ITIL

    Directory of Open Access Journals (Sweden)

    Didin Herlinudinkhaji

    2015-12-01

    Full Text Available IT Service Management adalah salah satu cara untuk mengelola layanan teknologi informasi. Layanan teknologi perlu dikelola dengan baik untuk mendapatkan output dalam bentuk informasi yang dibutuhkan oleh manajemen. Untuk meningkatkan layanan teknologi informasi untuk lebih baik, diperlukan audit meliputi audit layanan teknologi informasi. Audit layanan teknologi informasi dilakukan untuk menentukan kelayakan teknologi informasi denngan terkait, dalam hal ini penulis berfokus pada isu-isu keamanan teknologi informasi. Audit keamanan teknologi informasi dibuat untuk menentukan tingkat keamanan untuk layanan teknologi informasi, sejauh mana informasi tersebut bisa sampai kepada yang berhak menerima, apakah informasi tersebut benar-benar tersedia, apakah informasi tersebut bersifat rahasia. Untuk dapat mengukur tingkat keamanan layanan teknologi informasi, penulis memilih untuk menggunakan metode Information Technology Infrastructure Library Versi 3 (ITIL V3. ITIL adalah set yang terdiri dari Layanan Strategi, Jasa Desain, Jasa Transisi, Layanan Operasi, dan terus-menerus Peningkatan Pelayanan. Dalam hal ini penulis berfokus pada layanan desain pada bagian dari manajemen keamanan informasi, pada bagian ini menjelaskan bagaimana layanan dikatakan baik jika memenuhi 8 poin yang telah distandarisasi secara internasional.

  16. Security and privacy issues with health care information technology.

    Science.gov (United States)

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  17. the relevance of libraries and information communicaton technology ...

    African Journals Online (AJOL)

    GRACE

    College Library, Federal College of Education,. P.M.B.2001, Eha-Amufu, Enugu State, ... people are found in sub-Saharan Africa, with Nigeria having the greatest number (UNO Report 2003). The illiteracy ... is no longer about good stock management. More so, library is a non-profit making organization and greatly looked.

  18. Preserving Library Value through the Shifting Tides of Technology

    Science.gov (United States)

    Breeding, Marshall

    2012-01-01

    The core mission of libraries has always centered on making content and related services available to patrons. The form in which that content is delivered has changed continually. The most ancient libraries or archives organized clay tablets or cylinders written in cuneiform. Centuries ago, the transition from scrolls to codices must have been…

  19. Looking Toward the Future of Library Technology. The Systems Librarian

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    This article discusses trends in five areas relating to software developed for libraries, and based on these trends, the author's predictions for developments that might play out in the next few years. The author's predictions, based on his own empirical observations, include: (1) the integrated library system (ILS) will be reintegrated; (2) the…

  20. Securing technological equipment against uncommon seismic effects

    International Nuclear Information System (INIS)

    Podrouzek, J.

    1987-01-01

    Practical possibilities are discussed of seismic modifications of power plant structures and systems with a view to ancillary equipment providing such modifications. Briefly outlined are the possibilities of reinforcing technological equipment and systems operating at normal temperatures, where the basic precondition of seismic resistance is strong and reliable anchorage. Attention is paid to equipment handling high temperature media. In these cases, in selecting seismic protection thermal expansion should be considered as an accompanying effect. Different types are described in detail of hydraulic and mechanical limiters of foreign makes. It is stated on the basis of practical experience that hydraulic limiters involve a number of problems. Mechanical limiters seem to be more appropriate in spite of the complexity of their operation. Viscous dampers are another suitable element for the seismic protection of power plant technological equipment. (Z.M.). 22 figs., 3 tabs., 19 refs

  1. The Leadership Dimension in Information and Communication Technology Adoption in African Libraries

    Directory of Open Access Journals (Sweden)

    Adetoun A. Oyelude

    2014-02-01

    Full Text Available The article focuses on leadership challenges in adaptation to Information and Communication Technologies (ICTs in African libraries. It identifies and discusses the need for adequate leadership styles and behavior in the bid to adapt effectively to new technologies. Online survey, observation arising from personal professional practice experience, personal communication, and interview methods were used to gather data for the study. Older library professionals, many of whom are still very visible across the leadership strata of libraries, were found to exhibit diverse attitude to the adaptation to ICTs deployment and use in their libraries. Some library leaders and older generation professionals were discovered to react somewhat negatively to changes in technology used in their libraries, preventing the younger professionals from performing to full capacity, and generally showing nonchalance to new technologies. Proper training and retraining, mentoring, and harnessing the synergy of ideas, with respectful communication from new generation library professionals, was found to be desirable. Change management workshops and implementation of standard ethics of the profession are recommended, while emphasis is put on the need for library professionals to overcome their technophobia and take leadership in adapting to move the library and information profession forward.

  2. Integration of Library Services with Internet of Things Technologies

    Directory of Open Access Journals (Sweden)

    Kyriakos Stefanidis

    2015-10-01

    Full Text Available The SELIDA framework is an integration layer of standardized services that takes an Internet-of-Things approach for item traceability in the library setting. The aim of the framework is to provide tracing of RFID tagged physical items among or within various libraries. Using SELIDA we are able to integrate typical library services—such as checking in or out items at different libraries with different Integrated Library Systems—without requiring substantial changes, code-wise, in their structural parts. To do so, we employ the Object Naming Service mechanism that allows us to retrieve and process information from the Electronic Product Code of an item and its associated services through the use of distributed mapping servers. We present two use case scenarios involving the Koha open source ILS and we briefly discuss the potential of this framework in supporting bibliographic Linked Data.

  3. Libraries as a venue for exciting education technology, both high tech and low

    Science.gov (United States)

    Harold, J. B.; Dusenbery, P.; Holland, A.

    2016-12-01

    Public libraries provide a broad range of possibilities for reaching diverse audiences with NASA and STEM related content and activities, from hands-on activities, to interactive kiosks incorporating science based games, simulations, and real-time data. NCIL/SSI has been developing STEM-based exhibits and program activities for public libraries since 2007, and is currently managing 7 national tours in partnership with the American Library Association and other organizations. Past and current exhibitions will reach over 100 libraries and an estimated 1.5 million patrons. In this paper we will discuss a range of findings from almost a decade of deploying both high and low tech STEM learning strategies into libraries, including usage and engagement by library patrons, and challenges (and solutions) for deploying technologically sophisticated components into libraries which may or may not have dedicated technical staff.

  4. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  5. TRACKING AND AUTOMATING A LIBRARY SYSTEM USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY

    OpenAIRE

    Alwadi, Ali; Kilby, Jeff; Gawanmeh, Amjad

    2017-01-01

    This paper discusses implementing a Location-Aware Library RFID service employing Radio Frequency Identification as a communication technology. Automating a library system with passive RFID tag infrastructure is proven to be feasible, and can be achieved with even distribution of RFID Antennas, well designed RFID network, an appropriate middleware, and a library application with an accurate error function that minimizes the error in the detected location to an acceptable distance, for instanc...

  6. Rapid access to compound libraries through flow technology: fully automated synthesis of a 3-aminoindolizine library via orthogonal diversification.

    Science.gov (United States)

    Lange, Paul P; James, Keith

    2012-10-08

    A novel methodology for the synthesis of druglike heterocycle libraries has been developed through the use of flow reactor technology. The strategy employs orthogonal modification of a heterocyclic core, which is generated in situ, and was used to construct both a 25-membered library of druglike 3-aminoindolizines, and selected examples of a 100-member virtual library. This general protocol allows a broad range of acylation, alkylation and sulfonamidation reactions to be performed in conjunction with a tandem Sonogashira coupling/cycloisomerization sequence. All three synthetic steps were conducted under full automation in the flow reactor, with no handling or isolation of intermediates, to afford the desired products in good yields. This fully automated, multistep flow approach opens the way to highly efficient generation of druglike heterocyclic systems as part of a lead discovery strategy or within a lead optimization program.

  7. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  8. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  9. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  10. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys, Inc., Bolder Technologies Corp., Boyds Wheels, Inc... securities of Biometrics Security Technology, Inc. because it has not filed any periodic reports since...

  11. Self-Service Charge Systems: Current Technological Applications and Their Implications for the Future Library.

    Science.gov (United States)

    Mardikian, Jackie

    1995-01-01

    Discusses a possible shift to self-service check-out systems for academic library patrons. Provides an annotated bibliography of 51 items that discuss the impact of self-service technology on the quality of service and customer satisfaction in libraries, service sectors, banking, and the vending industry. (LRW)

  12. The Status of Information Technology in Iranian Hospital Libraries: A Comparative Study of Managers' Attitude

    Science.gov (United States)

    Isfandyari-Moghaddam, Alireza; Sedehi, Maryam; Dehghani, Mozhdeh; Nemati-Anaraki, Leila; Hasanzadeh-Dizaji, Elaheh

    2013-01-01

    Purpose: The purpose of this paper is to compare the attitude of the managers of libraries located at Iran, Tehran and Shahid Beheshti Medical Sciences Universities' training hospitals, on the status of information technology (IT) in the mentioned libraries. Design/methodology/approach: This study employed a researcher-made questionnaire. The…

  13. Biofuels. Environment, technology and food security

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, Jose C.; Lora, Electo S.; Venturini, Osvaldo J. [NEST - Excellence Group in Thermal Power and Distributed Generation, Mechanical Engineering Institute, Universidade Federal de Itajuba (Brazil); Yanez, Edgar E. [CENIPALMA, Oil Palm Research Center - Cenipalma, Calle 21 42-C-47, Bogota (Colombia); Castillo, Edgar F. [CENICANA - Sugarcane Research Center of Colombia, Calle 58 N, 3BN-110, A.A., 9138 - Cali (Colombia); Almazan, Oscar [ICIDCA - Instituto Cubano de Investigaciones de los Derivados de la Cana de Azucar, Via Blanca y Carretera Central 804, San Miguel del Padron, A.P. 4036, La Habana (Cuba)

    2009-08-15

    The imminent decline of the world's oil production, its high market prices and environmental impacts have made the production of biofuels to reach unprecedent volumes over the last 10 years. This is why there have been intense debates among international organizations and political leaders in order to discuss the impacts of the biofuel use intensification. Besides assessing the causes of the rise in the demand and production of biofuels, this paper also shows the state of the art of their world's current production. It is also discussed different vegetable raw materials sources and technological paths to produce biofuels, as well as issues regarding production cost and the relation of their economic feasibility with oil international prices. The environmental impacts of programs that encourage biofuel production, farmland land requirements and the impacts on food production are also discussed, considering the life cycle analysis (LCA) as a tool. It is concluded that the rise in the use of biofuels is inevitable and that international cooperation, regulations and certification mechanisms must be established regarding the use of land, the mitigation of environmental and social impacts caused by biofuel production. It is also mandatory to establish appropriate working conditions and decent remuneration for workers of the biofuels production chain. (author)

  14. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  15. A Modest Art: Securing Privacy in Technologically Mediated Homecare.

    Science.gov (United States)

    Kamphof, Ike

    2017-01-01

    This article addresses the art of living in a technological culture as the active engagement with technomoral change. It argues that this engagement does not just take the form of overt deliberation. It shows in more modest ways as reflection-in-action, an experimental process in which new technology is fitted into existing practices. In this process challenged values are re-articulated in pragmatic solutions to the problem of working with new technology. This art of working with technology is also modest in the sense that it is not oriented to shaping one's own subjectivity in relation to technology. It emanates from human existence as relational and aims at securing good relationships. The argument will be developed in relation to a case study of the ways in which homecare workers engaged with the value of privacy, challenged by tele-monitoring technology that was newly introduced into their work.

  16. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    Science.gov (United States)

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  17. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  18. Library Technology Centers and Community Building: Yale University Library Electronic Text Center.

    Science.gov (United States)

    Goldenberg-Hart, Diane Y.

    1998-01-01

    Discusses various communities that have contributed to the development of the Yale University Library Electronic Text Center (ETC) and describes the evolution of the ETC from a center for the support of electronic texts in the humanities to an electronic resource center providing support in the creation of World Wide Web resources. (LRW)

  19. A Structural Contingency Theory Model of Library and Technology Partnerships within an Academic Library Information Commons

    Science.gov (United States)

    Tuai, Cameron K.

    2011-01-01

    The integration of librarians and technologists to deliver information services represents a new and potentially costly organizational challenge for many library administrators. To understand better how to control the costs of integration, the research presented here will use structural contingency theory to study the coordination of librarians…

  20. Roadmap for RFID Implementation in Central library, PEC University of Technology

    OpenAIRE

    Vasishta, Seema

    2009-01-01

    This paper gives brief idea about the emerging Radio Frequency Identification (RFID) technology, its importance in the library management system and its working. It also describes about the basic and optional components required for smooth working of the exercise. The aim is to consider how to extend RFID applications in an academic library keeping in view the scantiness of funds and scarcity of supporting staff. The article also illustrates a vivid picture about how RFID technology is acting...

  1. Computer Infrastructure Facilities and Services at National Institutes of Technology Libraries in India

    OpenAIRE

    Y, Srinivasa Rao; BK, Choudhury

    2010-01-01

    Computer infrastructure plays a critical role in the academic system for meeting teaching, learning and research needs. Libraries are an integral part of academic system. Adequate infrastructure facilities support academic libraries share their resources and services in an effective way. National Institute of Technology, erstwhile regional engineering college, are prime institutions and benchmark for technical education in India in the field of engineering, science and technology. T...

  2. Technological energy and environmental refurbishment of historical Italian libraries

    Directory of Open Access Journals (Sweden)

    Alessandra Battisti

    2014-10-01

    Full Text Available Active libraries in Italy are around 13.000 and, taken as a whole, the property and management relate mainly to public institutions such as the state, regions, local authorities, cultural institutions, universities, and partly to religious institutions and individuals. In this paper is presented the work of studies and research, commissioned to the authors by the General Direction for Libraries of the Ministry of Heritage and Culture (Mibac, which ended recently, addressing the architectural, energy and environmental refurbishment of national historic libraries distributed on the Italian territory, with special focus on 4 among 46 owned by the Ministry of Culture (the Nazionale Centrale di Roma, the Nazionale Centrale in Florence, the national University of Turin and the Angelica in Rome believed by the authors and client as examples of recurring issues and ideals to lend itself to the construction of a model of intervention replicable on other historical Italian libraries.The main objective of the project is the identification of physical and perceptual factors of wear2, which threaten the conservation of the historical and artistic heritage of the historic center of Venice, with a particular focus on the effects of anthropogenic pressure linked to tourism, and the evaluation of their level of danger. A further objective is the recognition of measurable parameters (indicators for monitoring and, subsequently, mitigation strategies for the most significant phenomena.

  3. Implications of Information Technology on the Training of Library ...

    African Journals Online (AJOL)

    There is great importance to change in the present era and it is the cause of human progress ... information science professionals, the library and the curriculum is very important. In the present environment .... theoretical background, good interpersonal and teamwork skills, the ability to think analytically and critically and ICT ...

  4. Enhancing a Mainframe Library System through Microcomputer Technology.

    Science.gov (United States)

    Breeding, Marshall

    1988-01-01

    Discusses ways a microcomputer system might enhance the mainframe library system at Vanderbilt University. Topics include: (1) types of microcomputers; (2) types of terminals; (3) characteristics of a dumb terminal; (4) characteristics of an intelligent terminal; (5) which terminals should be given additional features; and (6) designing an…

  5. The Energy Science and Technology Database on a local library system: A case study at the Los Alamos National Research Library

    Energy Technology Data Exchange (ETDEWEB)

    Holtkamp, I.S.

    1994-10-01

    This paper presents an overview of efforts at Los Alamos National Laboratory to acquire and mount the Energy Science and Technology Database (EDB) as a citation database on the Research Library`s Geac Advance system. The rationale for undertaking this project and expected benefits are explained. Significant issues explored are loading non-USMARC records into a MARC-based library system, the use of EDB records to replace or supplement in-house cataloging of technical reports, the impact of different cataloging standards and database size on searching and retrieval, and how integrating an external database into the library`s online catalog may affect staffing and workflow.

  6. A New Spin on Library Media Centers: The Hub of the School with the Help of Technology

    Science.gov (United States)

    Kaser, Linda R.

    2005-01-01

    Library media centers can evolve into technological, informational, and recreational hub of schools and can help technophobes access their many resources. A greater and better understanding of what it is exactly that library media specialists do can thus be achieved.

  7. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  8. Information technology potentials for inter-library loan and cooperation

    African Journals Online (AJOL)

    No Abstract. Lagos Journal of Library and Information Science Vol. 1(2) 2003: 106-112. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/ljlis.v1i2.35484 · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for ...

  9. RANCANGAN INFORMATION TECHNOLOGY SERVICE MANAGEMENT MENGGUNAKAN INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (Studi Kasus: STMIK AMIKOM Purwokerto

    Directory of Open Access Journals (Sweden)

    Nurfaizah Nurfaizah

    2015-08-01

    Full Text Available STMIK AMIKOM Purwokerto merupakan salah satu perguruan tinggi swasta yang dalam proses pengelolaan dan  penyampaian informasi telah menerapan teknologi informasi. Proses pelayanan suatu perguruan tinggi dipandang sebagai suatu solusi yang nantinya dapat meningkatkan kemampuan perusahaan di dalam pelayanan. Hal ini menyebabkan pentingnya peningkatan peran teknologi informasi agar selaras dengan  investasi baik hardware dan software yang dikeluarkan, sehingga dibutuhkan perencanaan yang optimal.IT Service Management (ITSM digunakan sebagai upaya untuk meningkatkan efisiensi pelayanan teknologi informasi kepada pengguna yang terdapat dalam framework Information Technology Infrastructure Library.Diharapkan dengan penerapan ITSM pengelolaan layanan TI menjadi lebih baik serta mampu menyelesaikan beberapa permasalahan yang ada pada organisasiyang sedang berjalan dengan menggunakan COBIT 4.1. ITSM menghasilkan perancangan pada masing-masing prosesnya dari 2 domain pembangun ITSM yaitu domain service support dan service delivery. Kata Kunci: ITSM, ITIL V3, COBIT 4.1

  10. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ... renewal of the charter of the Homeland Security Science and Technology Advisory Committee (HSSTAC) is... Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410..., cyber-security, knowledge management and how best to leverage related technologies funded by other...

  11. 76 FR 27741 - 60-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-05-12

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of...: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements Pursuant to 22 CFR 126... by the consignee or end-user. Section 126.18 also provides that the technology security/clearance...

  12. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements... consignee or end-user. Section 126.18 also provides that the technology security/clearance plan, screening...

  13. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ... Security Science and Technology Advisory Committee (HSSTAC) is necessary and in the public interest in connection with the Department of Homeland Security, Science and Technology Directorate's performance of its... Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington, DC 20528...

  14. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Security Science and Technology Advisory Committee (HSSTAC) would meet on September 27-28, 2012 in... of Homeland Security (DHS), Science and Technology Directorate, 1120 Vermont Avenue NW., (Room 5-212... Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of Homeland Security...

  15. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Executive Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane... Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how...

  16. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... after Sept. 12: http://www.dhs.gov/homeland-security-science-and-technology-advisory-committee-hsstac... Director, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  17. Implementing Technology and Gaming Lessons in a School Library

    Science.gov (United States)

    Mashriqi, Khalida

    2011-01-01

    School librarians play numerous roles throughout a day. They are information specialists who keep up with the constant changes in information and technology. It is important for them to keep students up-to-date and teach them to use technology properly. Gaming and technology are both important concepts for 21st-century school librarians to…

  18. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  19. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  20. Uranium mining and metallurgy library science and technology literature retrieval of network

    International Nuclear Information System (INIS)

    Tang Lilei

    2014-01-01

    This paper introduces the network resources and characteristics retrieve service of Beijing research Institute of Chemical Engineering of Metallurgy library, Analyzes the problems often encountered in the literature retrieval in science and technology, And puts forward the solution, Puts forward the thinking and Suggestions of science and technology literature retrieval. (author)

  1. Geospatial Technology Support in Small Academic Libraries: Time to Jump on Board?

    Science.gov (United States)

    Macfarlane, Carrie M.; Rodgers, Christopher M.

    2008-01-01

    Many librarians at small academic institutions have been wondering if they can, or even should, support the use of geospatial technology on their campuses. At the Middlebury College Libraries, we have developed a model of support for geospatial technology which we think might be versatile and transferable enough to try elsewhere.

  2. Impact of information technology on the role of medical libraries in information managment: normative background

    Directory of Open Access Journals (Sweden)

    Anamarija Rožić-Hristovski

    1998-01-01

    Full Text Available Exponential growth of biomedical knowledge and information technology development is changing the infrastructure of health care systems, education and research. So medical libraries roles have shifted from managing containers of information toward influencing biomedical information resource content and education. These new tasks are formalised in modem American standards for medical libraries, stressing information management role in evolving environment.In Slovenia medical libraries also are aware of development imperative of information activities for advances in medicine. At one side they are faced with lack of specific guidelines for proactive action and on the other with inadequate assessment in legal documents and insufficient funding.

  3. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  4. Computers behind bars : Information technology in Canadian prison libraries

    DEFF Research Database (Denmark)

    Prange, Laurie

    This report is the result of an independent study undertaken with the Faculty of Information and Media Studies (FIMS) at The University of Western Ontario (UWO) and advised by Dr. Carole Farber, Professor. The focus of this study is upon the impact the increased popularity of electronic provision...... of information can have upon Canadian prison libraries. Gathered information is compared with the results of Canadian policy regarding the provision of information to inmates. The analysis of the collected facts can provide insight to help prison librarians deal with the increasing popularity of electronic...... provision of information in relation to legal constraints....

  5. Information and Library Programs at the Technology Application Center (TAC).

    Science.gov (United States)

    Burch, Eugene

    The Technology Application Center (TAC) at the University of New Mexico is one of six National Aeronautics and Space Administration (NASA) regional dissemination centers originally established to disseminate NASA technology to private industry on a regional basis. A fee is charged for TAC's services so it has been market oriented and has sought to…

  6. SCIENTIFIC EDUCATIONAL ELECTRONIC LIBRARIES IN EDUCATING INFORMATIONAL SYSTEMS AND TECHNOLOGIES OF FUTURE MANAGERS

    Directory of Open Access Journals (Sweden)

    Nataliia S. Prilutska

    2013-09-01

    Full Text Available The article deals with the main principles of electronic libraries. It analyzes primary types of digital scientific and educational resources, presented in electronic libraries and defines the techniques of effective structuring of the learning content by means of informational technologies in the conditions of the informational processes intensification. The scientific fundamentals of choice of educational material are determined and the structure of the educational subject ''Informational Systems and Technologies'' under the credit and module system are designated. The declared structure of educational subject is taught for the students of the social-pedagogical department, referral courses ''Management''.

  7. Information and communication technologies for knowledge management in academic libraries in Nigeria and South Africa

    Directory of Open Access Journals (Sweden)

    Rexwhite T. Enakrire

    2017-05-01

    improve the understanding of how librarians manage the organisation in present-day library operations. We recommend that staff development be intensified to enable how librarians could cope with changes and new technologies for modern information services being encouraged and acquired. This article provides a unique long-term survey on the use of ICT facilities and services, strategy and structure in an academic and/or university library services.

  8. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  9. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  10. Information Technology and the Evolution of the Library

    Science.gov (United States)

    2009-03-01

    access through LDAP authentication, CAC login, and other single-sign-on technologies (The Defense Technical Information Center, 2008). In providing its...Consumers: All Mgmt: WSU manages content, OhioLINK the system Moderated through staff, eventually LDAP for submission and lib staff review

  11. A Survey of Technology Training for Library Media Specialist in Ohio.

    Science.gov (United States)

    Frioni, Jeannette; Kazemzadeh, Andrea

    1994-01-01

    A survey was conducted of 100 Ohio school library media specialists (79% return) to determine where they received their technology training. Years of experience ranged from 1 to 32 with and average of 16 years. Results indicate that 85% of training has occurred after employment; and 8 figures display the survey results. (AEF)

  12. Proposal for Implementing Multi-User Database (MUD) Technology in an Academic Library.

    Science.gov (United States)

    Filby, A. M. Iliana

    1996-01-01

    Explores the use of MOO (multi-user object oriented) virtual environments in academic libraries to enhance reference services. Highlights include the development of multi-user database (MUD) technology from gaming to non-recreational settings; programming issues; collaborative MOOs; MOOs as distinguished from other types of virtual reality; audio…

  13. Intelligent Technologies in Library and Information Service Applications. ASIST Monograph Series.

    Science.gov (United States)

    Lancaster, F. W.; Warner, Amy

    The objective of this study was to gain enough familiarity with developments in artificial intelligence (AI) and related technologies to be able to advise the information service community on what can be applied today and what one might reasonably expect to be applicable to library and information services in the near future. The emphasis is on…

  14. Expert Systems: Concepts and Applications. Advances in Library Information Technology, Issue Number 1.

    Science.gov (United States)

    Fenly, Charles; Harris, Howard

    The Processing Services department of the Library of Congress initiated a project to learn about expert systems technology and to examine potential applications of expert systems to functions in their department, e.g., acquisitions, cataloging, and serials control. (An expert system is defined as an artificial intelligence computer program which…

  15. Assessing Factors Affecting Implementation of Information Technology Infrastructure Library Process Measurements

    Science.gov (United States)

    Peterson, Kristy

    2010-01-01

    The capability of organizations to operate on the Information Technology Infrastructure Library (ITIL) framework is reliant on ITIL process measurements. Appropriate ITIL process measurements help ensure desired outcomes, enable corrective actions to take place prior to process failure, and direct process activities towards continuous improvement.…

  16. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  17. Use of Information and Communication Technology (ICT) in Collection Development in Scientific and Research Institute Libraries in Iran: A study

    Science.gov (United States)

    Khademizadeh, Shahnaz

    2012-08-01

    The explosion of information communication technology (ICT) since the beginning of the 20th century has been rendering manual-based library system in academic, research, special and public libraries less relevant. This is because using and implementing information communication technology in the library depend largely on the librarian attitude toward the current digital age. This study examined the attitudinal correlates of some selected scientific and research institutes libraries in Irantowards the use and application of ICT in their various libraries. A total of ten libraries from all the forty nine libraries in Iran formed the studyís population. It is observed that 'Internet/intranet etc' (1046; 67.5%) is the most important source through which the users become aware of modern information technologies used in their libraries. The vast majority of the respondents who answered electronic sources make it 'Easier' to gather and use information are (1313; 84.7%). The results indicate that there is a significant relationship between e-environment and collection development (?262.86, p=0.000). Findings further show that all of librarians (9; 100%) opined they feel that ICT application affects the collection development of library. Based on these findings, it is recommended that libraries in the developing countries should consider training those librarians who do not have knowledge of ICT in order to remove the fear and anxiety hindering them from developing good attitude towards the use of ICT in their libraries.

  18. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  19. Drug discovery in the kinase inhibitory field using the Nested Chemical Library technology.

    Science.gov (United States)

    Kéri, György; Székelyhidi, Zsolt; Bánhegyi, Péter; Varga, Zoltán; Hegymegi-Barakonyi, Bálint; Szántai-Kis, Csaba; Hafenbradl, Doris; Klebl, Bert; Muller, Gerhard; Ullrich, Axel; Erös, Dániel; Horváth, Zoltán; Greff, Zoltán; Marosfalvi, Jenö; Pató, János; Szabadkai, István; Szilágyi, Ildikó; Szegedi, Zsolt; Varga, István; Wáczek, Frigyes; Orfi, László

    2005-10-01

    Kinase inhibitors are at the forefront of modern drug research, where mostly three technologies are used for hit-and-lead finding: high throughput screening of random libraries, three-dimensional structure-based drug design based on X-ray data, and focused libraries around limited number of new cores. Our novel Nested Chemical Library (NCL) (Vichem Chemie Research Ltd., Budapest, Hungary) technology is based on a knowledge base approach, where focused libraries around selected cores are used to generate pharmacophore models. NCL was designed on the platform of a diverse kinase inhibitory library organized around 97 core structures. We have established a unique, proprietary kinase inhibitory chemistry around these core structures with small focused sublibraries around each core. All the compounds in our NCL library are stored in a big unified Structured Query Language database along with their measured and calculated physicochemical and ADME/toxicity (ADMET) properties, together with thousands of molecular descriptors calculated for each compound. Biochemical kinase inhibitory assays on selected, cloned kinase enzymes for a few hundred NCL compound sets can provide sufficient biological data for rational computerized design of new analogues, based on our pharmacophore model-generating 3DNET4W QSPAR (quantitative structure-property/activity relationships) approach. Using this pharmacophore modeling approach and the ADMET filters, we can preselect synthesizable compounds for hit-and-lead optimization. Starting from this point and integrating the information from QSPAR, high-quality leads can be generated within a small number of optimization cycles. Applying NCL technology we have developed lead compounds for several validated kinase targets.

  20. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  1. Privacy and Security within Biobanking: The Role of Information Technology.

    Science.gov (United States)

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source. © 2016 American Society of Law, Medicine & Ethics.

  2. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  3. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Science.gov (United States)

    2010-10-01

    ... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...

  4. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  5. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  6. Library Automation

    OpenAIRE

    Dhakne, B. N.; Giri, V. V; Waghmode, S. S.

    2010-01-01

    New technologies library provides several new materials, media and mode of storing and communicating the information. Library Automation reduces the drudgery of repeated manual efforts in library routine. By use of library automation collection, Storage, Administration, Processing, Preservation and communication etc.

  7. Multimedia Bootcamp: a health sciences library provides basic training to promote faculty technology integration.

    Science.gov (United States)

    Ramsey, Ellen C

    2006-04-25

    Recent research has shown a backlash against the enthusiastic promotion of technological solutions as replacements for traditional educational content delivery. Many institutions, including the University of Virginia, have committed staff and resources to supporting state-of-the-art, showpiece educational technology projects. However, the Claude Moore Health Sciences Library has taken the approach of helping Health Sciences faculty be more comfortable using technology in incremental ways for instruction and research presentations. In July 2004, to raise awareness of self-service multimedia resources for instructional and professional development needs, the Library conducted a "Multimedia Bootcamp" for nine Health Sciences faculty and fellows. Case study. Program stewardship by a single Library faculty member contributed to the delivery of an integrated learning experience. The amount of time required to attend the sessions and complete homework was the maximum fellows had to devote to such pursuits. The benefit of introducing technology unfamiliar to most fellows allowed program instructors to start everyone at the same baseline while not appearing to pass judgment on the technology literacy skills of faculty. The combination of wrapping the program in the trappings of a fellowship and selecting fellows who could commit to a majority of scheduled sessions yielded strong commitment from participants as evidenced by high attendance and a 100% rate of assignment completion. Response rates to follow-up evaluation requests, as well as continued use of Media Studio resources and Library expertise for projects begun or conceived during Bootcamp, bode well for the long-term success of this program. An incremental approach to integrating technology with current practices in instruction and presentation provided a supportive yet energizing environment for Health Sciences faculty. Keys to this program were its faculty focus, traditional hands-on instruction, unrestricted

  8. INTERNET SECURITYTECHNOLOGY AND SOCIAL AWARENESS OF THE DANGERS

    Directory of Open Access Journals (Sweden)

    Laskowski Piotr Paweł

    2017-06-01

    Full Text Available The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces the risk of data loss or identity theft. Public awareness of threats continues to grow, but there are also new, previously unknown threats; that is why it is so important to inform of the dangers by all available channels of communication.

  9. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  10. Consortia for Engineering, Science and Technology Libraries in India: A Case Study of INDEST Consortium

    Science.gov (United States)

    Pathak, S. K.; Deshpande, N. J.

    2007-10-01

    The present scenario of the INDEST Consortium among engineering, science and technology (including astronomy and astrophysics) libraries in India is discussed. The Indian National Digital Library in Engineering Sciences & Technology (INDEST) Consortium is a major initiative of the Ministry of Human Resource Development, Government of India. The INDEST Consortium provides access to 16 full text e-resources and 7 bibliographic databases for 166 institutions as members who are taking advantage of cost effective access to premier resources in engineering, science and technology, including astronomy and astrophysics. Member institutions can access over 6500 e-journals from 1092 publishers. Out of these, over 150 e-journals are exclusively for the astronomy and physics community. The current study also presents a comparative analysis of the key features of nine major services, viz. ACM Digital Library, ASCE Journals, ASME Journals, EBSCO Databases (Business Source Premier), Elsevier's Science Direct, Emerald Full Text, IEEE/IEE Electronic Library Online (IEL), ProQuest ABI/INFORM and Springer Verlag's Link. In this paper, the limitations of this consortium are also discussed.

  11. The use of mobile technology in health libraries: a summary of a UK-based survey.

    Science.gov (United States)

    Chamberlain, David; Elcock, Martin; Puligari, Preeti

    2015-12-01

    Health libraries have changed over the past fifteen years in the format of the information they provide. This is driven by developments in technology. To conduct a survey of NHS health libraries in the United Kingdom in order to summarise how mobile technologies are being used, how they are promoted and how they are delivered, highlighting good practice and solutions to issues. An online survey was carried out in 2013 and sent to academic and NHS web-based discussion lists. There were 199 responses. Main replies were from large Acute Hospital Trusts. Only 18% of respondents had conducted research into use of mobile technology (MT) within their Trust. Forty per cent of Trusts offered clinical point of care tools, 29% mobile catalogues, and 30% had mobile enabled web sites. Libraries utilised third-party partnerships rather than develop their own applications or tools. Seventy per cent of Trusts promoted new MT services via e-mail. Network restrictions were the main barrier to development as well as finance and expertise. Uptake and development of MT is sporadic and driven by individuals. There is an opportunity for collaboration and sharing resources and expertise. There are benefits to adopting user-friendly resources. © 2015 Health Libraries Group.

  12. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  13. The Role of Information and Communication Technology (ICT) in the Provision of Library Services in Akwa Ibom State E–Library, Nigeria

    OpenAIRE

    Aniebiet Inyang Ntui

    2014-01-01

    This research work is on the role of information and communication Technology (ICT) in the provision of library services in Akwa Ibom State e–library. Survey research design was adopted for the study. The population of the study was made up of 73 staff working in the Akwa Ibom State e-library. A total of 60 respondents were selected from the population as the sample for the study. The major instrument used for collection of data was the questionnaire designed by the researchers. The data coll...

  14. The Changing Role of Librarians - Managing New Technologies in Libraries

    Science.gov (United States)

    Griffiths, J.-M.

    Never before have there been so many opportunities for involvement in an information-based society including electronic and multimedia publishing; local, national, and global networking; development of navigational and filtering tools for access to networked and non-electronic sources; and new modes for delivering information and educational programs. The base of recorded information is growing at an accelerating rate, in increasing varieties of formats (texts, numeric, graphic, video, audio, image, electronic, etc.). Furthermore, an increasing array of computing and telecommunications technologies are emerging to create new options and opportunities for the development of information capture, storage, retrieval, and delivery systems/services. These developments point toward increased difficulty for the information user to obtain needed information in the required time-frame, quantity, and level of detail. The role of information specialists is to facilitate the interactions between the potential information user community and the body of recorded information. The traditional information access and management roles played by the information professions are expanding, particularly in the design and development of new information products and services and of tools to support information seeking and selection, the analysis and synthesis of information content on behalf of users, and information user instruction. The emerging recognition of companies as learning organizations, reinvention of government agencies, new directions for education in universities, colleges, and schools, promise new opportunities for information specialists to reinforce and expand their facilitation of communication and learning processes in their organizations and communities.

  15. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  16. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  17. Miniaturization Technologies for Efficient Single-Cell Library Preparation for Next-Generation Sequencing.

    Science.gov (United States)

    Mora-Castilla, Sergio; To, Cuong; Vaezeslami, Soheila; Morey, Robert; Srinivasan, Srimeenakshi; Dumdie, Jennifer N; Cook-Andersen, Heidi; Jenkins, Joby; Laurent, Louise C

    2016-08-01

    As the cost of next-generation sequencing has decreased, library preparation costs have become a more significant proportion of the total cost, especially for high-throughput applications such as single-cell RNA profiling. Here, we have applied novel technologies to scale down reaction volumes for library preparation. Our system consisted of in vitro differentiated human embryonic stem cells representing two stages of pancreatic differentiation, for which we prepared multiple biological and technical replicates. We used the Fluidigm (San Francisco, CA) C1 single-cell Autoprep System for single-cell complementary DNA (cDNA) generation and an enzyme-based tagmentation system (Nextera XT; Illumina, San Diego, CA) with a nanoliter liquid handler (mosquito HTS; TTP Labtech, Royston, UK) for library preparation, reducing the reaction volume down to 2 µL and using as little as 20 pg of input cDNA. The resulting sequencing data were bioinformatically analyzed and correlated among the different library reaction volumes. Our results showed that decreasing the reaction volume did not interfere with the quality or the reproducibility of the sequencing data, and the transcriptional data from the scaled-down libraries allowed us to distinguish between single cells. Thus, we have developed a process to enable efficient and cost-effective high-throughput single-cell transcriptome sequencing. © 2016 Society for Laboratory Automation and Screening.

  18. One-step generation of error-prone PCR libraries using Gateway® technology

    Science.gov (United States)

    2012-01-01

    Background Error-prone PCR (epPCR) libraries are one of the tools used in directed evolution. The Gateway® technology allows constructing epPCR libraries virtually devoid of any background (i.e., of insert-free plasmid), but requires two steps: the BP and the LR reactions and the associated E. coli cell transformations and plasmid purifications. Results We describe a method for making epPCR libraries in Gateway® plasmids using an LR reaction without intermediate BP reaction. We also describe a BP-free and LR-free sub-cloning method for in-frame transferring the coding sequence of selected clones from the plasmid used to screen the library to another one devoid of tag used for screening (such as the green fluorescent protein). We report preliminary results of a directed evolution program using this method. Conclusions The one-step method enables producing epPCR libraries of as high complexity and quality as does the regular, two-step, protocol for half the amount of work. In addition, it contributes to preserve the original complexity of the epPCR product. PMID:22289297

  19. Investigating the Application of Semantic Technology to Organize Information in Digital Library Software Systems

    Directory of Open Access Journals (Sweden)

    Simin Hajiahmadi

    2017-06-01

    The results indicated that digital libraries with respect to the application of semantic technology were not in good condition; therefore, they need to take all the weaknesses identified in this study into consideration. Software for IT architecture requires layers of meaning beyond their original design. In addition, regarding the languages implemented, semantic technology had very poor performance and none of the tools had this new technology to develop and implement. The majority of the tools employed were also in the initial stage of recognition. In many cases, information sources were kept outside of the databases and they had only text files for full-text search. On the whole, the software systems studied here were at the same level although they sometimes surpassed each other. The present study not only developed a checklist of the application of semantic technologies to organize information software digital library based on relevant literature and the experts, but also can make digital library software developers aware of their strengths and weaknesses, and the criteria and factors existing in this area in addition to the importance of each of them to help them in their own design and production in the future.

  20. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  1. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment Request; National Security and Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau of Industry and Security, Commerce. ACTION: Notice. SUMMARY: The Department of Commerce, as part of...

  2. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  3. Extending the Technological, Discursive, and Rhetorical Horizons of Academic Research Libraries' Information Architectures: An Analysis of North Carolina State University's James B. Hunt Jr. Library

    Science.gov (United States)

    Carr, Patrick L.

    2017-01-01

    This dissertation analyzes how North Carolina State University's (NCSU) James B. Hunt Jr. Library extends the ways in which the information architectures of academic research libraries can function as a technology, as discourse, and as rhetoric. The starting point for the analysis is the libraries of antiquity, which functioned technologically as…

  4. Scanning technology with multi-slice helical CT in security inspection domain

    International Nuclear Information System (INIS)

    Wang Jue; Wang Fuquan; Jiang Zenghui

    2008-01-01

    The paper analyzes the technology conditions of security inspection in home and abroad, and expatiates technology of spiral CT and how to define CT value etc, with studying on the key technology of spiral CT scanning way (X-RAY, detector, technology of pulley etc) and mutual relation. By comparing the present products of security inspection, the conclusion was drawn that it is inevitable to develop the tendency of security inspection area with the checking and discerning the substance by using the technology of multi-layer spiral CT. (authors)

  5. CERN Central Library : 2000 year old technology transfer. Two fragments of columns from a Roman building discovered during excavations for the PS in 1956 have prominent places in the Library where they can be enjoyed by all

    CERN Multimedia

    Laurent Guiraud

    2001-01-01

    CERN Central Library : 2000 year old technology transfer. Two fragments of columns from a Roman building discovered during excavations for the PS in 1956 have prominent places in the Library where they can be enjoyed by all

  6. A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies

    OpenAIRE

    Reddy, G. Nikhita; Reddy, G. J. Ugander

    2014-01-01

    Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper ma...

  7. User Characteristics、User Involvement and Technology Acceptance in Library Automation System Usage

    Directory of Open Access Journals (Sweden)

    Piching Chu

    2002-12-01

    Full Text Available This paper looks into the relationship of user characteristics, user involvement and technology acceptance, also try to find the relationship of the above three variables and library automation system usage. By interview and questionnaire study, the results are described, according to the analysis of the relative literature and the main conclusions, the researcher offers some suggestions for improving the system usage.[Article content in Chinese

  8. The evolution of systematic shelving method of the Central Technological Library (1993-2003

    Directory of Open Access Journals (Sweden)

    Mira Lebez

    2004-01-01

    Full Text Available To accomodate the stock in open public access, after the transfer of the Central Technological Library (CTK to the new location in the TR3 building in 1994, a new systematic shelving method was developed. The development of the UDC based code and the modifications of the basic scheme for arranging monographic publications shelving and e-serials classification on the CTK homepage are described. Compared to other shelving methods, the selected one is very user frendly in flexible.

  9. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  10. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  11. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  12. Technology News; Distance Education Project: Extending Extension Programming via Telecommunications Technology; [and] Fax for Library Services.

    Science.gov (United States)

    Coyle, Larry; Spitzer, Kathleen L.

    1992-01-01

    Three articles discuss (1) the numbers of microcomputers installed in elementary and secondary schools; (2) a distance education project in the Minnesota Extension Service that used a satellite delivery system and integrated it with a computer information network; and (3) the use of facsimile machines for library services. (LRW)

  13. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  14. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  15. A Sustainable Technology Contribuiting to the Food Security

    Directory of Open Access Journals (Sweden)

    Dra. Rosa Catalina Bermúdez-Savòn

    2015-11-01

    Full Text Available A sustainable way for food and energetic security in rural and the city regions, is presented with the application of the solid state fermentation for the biotransformation of lignocellulosic by-products and agro-industrial wastes with white-rot fungi. Inamush as advantages of this technology, is showed the cultivation of mushroom Pleurotus spp.on coffee pulp, cedar chip , coconut and cocoa shells, and the influence of it´s mixture (1:1, trough examination of their growth rates and conversion efficacy to fruiting bodies, which cause contamination of soil and water, because of large volumes and difficult management. The use of residues for these cultive was consolidate such as alternative viable for food production, capable to satisfy the protein and nutritive necessity of population in the non-developing countries, besides low cost production, high protein content and obtention in large quantity in short time. In addition to produce complements for animal feet, such as the spent oyster mushroom substrate postcosecha is detoxified, has proteic content and better digestibility than original substrates,and can be used as animal feed or fertilizer, at the same time, was eradicated the problem of environmental contamination of these residues provoking and further contribution at sustainable development of the communities.

  16. Nuclear material facilities - security systems and technology R and D trends

    International Nuclear Information System (INIS)

    Ellis, D.; Steele, B.

    2002-01-01

    Full text: In the US, physical security research and development (R and D) during the 1970s and 1980s created a body of technology and systems engineering that largely defined the industry for several decades. However, despite today's terrorists threats and risks, the overall funding of new and innovative physical security solutions is relatively very small. Such factors constraining physical security R and D include the expansion of overall security responsibilities, the emphasis on programmatic and business performance, in addition to evolving (mis)perceptions that 'the problem has been solved' or that 'anyone can do security'. Underlying these factors, the lack of robust standards and certifications has limited the development and application of physical security products, systems, and services. The research and development of new security technologies must be evaluated against very demanding constraints - including costs/benefits, emerging threats, and policies. Going forward, the goal will be to create a more comprehensive approach to physical security of nuclear material facilities that matches evolving threats and that will complement the transition to an integrated security/operations management environment. Such a management model evaluates the additional value of increasing security alternatives in addition to determining trade-offs between the programmatic mission and security issues. Correspondingly, more explicit and strategically useful measures must be developed to determine importance that, in turn, will influence security-related R and D efforts. The research and development of security technologies should be based upon identified needs and requirements resulting from a systematic analysis of the threat and other conditions. In particular, security technologies and systems must be evaluated in terms of current and long-term impacts. Such needs are (will be) diverse and will depend upon sustained research investments in a broad range of technologies

  17. Design and Development of a Technology Platform for DNA-Encoded Library Production and Affinity Selection.

    Science.gov (United States)

    Castañón, Jesús; Román, José Pablo; Jessop, Theodore C; de Blas, Jesús; Haro, Rubén

    2018-01-01

    DNA-encoded libraries (DELs) have emerged as an efficient and cost-effective drug discovery tool for the exploration and screening of very large chemical space using small-molecule collections of unprecedented size. Herein, we report an integrated automation and informatics system designed to enhance the quality, efficiency, and throughput of the production and affinity selection of these libraries. The platform is governed by software developed according to a database-centric architecture to ensure data consistency, integrity, and availability. Through its versatile protocol management functionalities, this application captures the wide diversity of experimental processes involved with DEL technology, keeps track of working protocols in the database, and uses them to command robotic liquid handlers for the synthesis of libraries. This approach provides full traceability of building-blocks and DNA tags in each split-and-pool cycle. Affinity selection experiments and high-throughput sequencing reads are also captured in the database, and the results are automatically deconvoluted and visualized in customizable representations. Researchers can compare results of different experiments and use machine learning methods to discover patterns in data. As of this writing, the platform has been validated through the generation and affinity selection of various libraries, and it has become the cornerstone of the DEL production effort at Lilly.

  18. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  19. The State of RFID Applications in Libraries

    Directory of Open Access Journals (Sweden)

    Jay Sing

    2006-03-01

    Full Text Available The adoption of Radio Frequency Identification (RFID technology by libraries promises a solution that could make it possible to inventory hundreds of thousands of items in their collections in days instead of months. In addition, it would allow patrons to check out and return library property automatically at any time of the day. Besides speeding up checkouts, keeping collections in better order, and alleviating repetitive strain injuries among librarians, RFID promises to provide a better control on theft, nonreturns, and misfiling of a library’s assets. With an estimated 35 million library items tagged worldwide in more than three hundred libraries, this technology is generating ever-increasing interest. In October and November 2004, the industrial technology department and the Robert E. Kennedy Library at Cal Poly State University, San Luis Obispo, surveyed participating libraries, RFID electronic discussion groups, and Library and Information Technology Association (LITA-L electronic discussion group subscribers to collect information with regards to the implementation of RFID systems in libraries. Opinions were gathered regarding such topics, actual or estimated, as RFID implementation costs and time; the impact of the technology on operations such as handling of volumes and security; and RFID system features adopted such as conversion stations, self-checkout units, and security systems. Information on the various RFID library components and the results from the survey are presented in this paper.

  20. 48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.

    Science.gov (United States)

    2010-10-01

    ... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...

  1. A Security Mechanism for library management system using low cost RFID tags

    Directory of Open Access Journals (Sweden)

    V. Nagalakshmi

    2007-02-01

    Full Text Available Radio Frequency Identification (RFID systems will become pervasive in our daily lives due to their low cost and easy to use characteristics[1]. This paper presents a methodology of using low cost RFID tags for a library management system to protect the books from unauthorized capturing and usage. Every object to be identified in the RFID system is physically labeled with a tag. In the proposed method a book or a magazine or a CD is identified with the RFID tag. Whenever a book is issued to any user of the library, the RFID reader will capture the information of that book and compares it with the related information of the book in the Online Public Access Catalogue (OPAC and issues the book to the user depending on his identity in the database. If any unauthorized person intends to take the book the RFID reader will immediately respond to that and make sure that it was not issued. If any body tries to remove the tag it can be traced with the help of location device. Keywords: RFID, OPAC, Unauthorized user, tag, Reader.

  2. Development of RFID Library Management Information System

    OpenAIRE

    Keshinro K. K1 ., Balogun W. A; Oyetola J. B3 ., Omogoye S. O4

    2016-01-01

    : RFID-based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling. This technology helps librarians reduce valuable staff time spent scanning barcodes while charging and discharging items. RFID is a combination of radio -frequency-based technology and microchip technologyThe methodology used was serial com...

  3. Advances in cyber security technology, operations, and experiences

    CERN Document Server

    Hsu, D Frank

    2013-01-01

    Advances in Cyber Security provides, in a technical yet easy to understand fashion, a real life story of the evolving cyberspace ecosystem from the perspectives of structure, function, and application. It also provides ways and means to secure and sustain this ecosystem by the collective wisdom of professionals and practitioners from government, academia, and industry across national and international boundaries.

  4. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  5. Discovery of Potent and Selective Inhibitors for ADAMTS-4 through DNA-Encoded Library Technology (ELT).

    Science.gov (United States)

    Ding, Yun; O'Keefe, Heather; DeLorey, Jennifer L; Israel, David I; Messer, Jeffrey A; Chiu, Cynthia H; Skinner, Steven R; Matico, Rosalie E; Murray-Thompson, Monique F; Li, Fan; Clark, Matthew A; Cuozzo, John W; Arico-Muendel, Christopher; Morgan, Barry A

    2015-08-13

    The aggrecan degrading metalloprotease ADAMTS-4 has been identified as a novel therapeutic target for osteoarthritis. Here, we use DNA-encoded Library Technology (ELT) to identify novel ADAMTS-4 inhibitors from a DNA-encoded triazine library by affinity selection. Structure-activity relationship studies based on the selection information led to the identification of potent and highly selective inhibitors. For example, 4-(((4-(6,7-dimethoxy-3,4-dihydroisoquinolin-2(1H)-yl)-6-(((4-methylpiperazin-1-yl)methyl)amino)-1,3,5-triazin-2-yl)amino)methyl)-N-ethyl-N-(m-tolyl)benzamide has IC50 of 10 nM against ADAMTS-4, with >1000-fold selectivity over ADAMT-5, MMP-13, TACE, and ADAMTS-13. These inhibitors have no obvious zinc ligand functionality.

  6. Promoter library-based module combination (PLMC) technology for optimization of threonine biosynthesis in Corynebacterium glutamicum.

    Science.gov (United States)

    Wei, Liang; Xu, Ning; Wang, Yiran; Zhou, Wei; Han, Guoqiang; Ma, Yanhe; Liu, Jun

    2018-03-21

    Due to the lack of efficient control elements and tools, the fine-tuning of gene expression in the multi-gene metabolic pathways is still a great challenge for engineering microbial cell factories, especially for the important industrial microorganism Corynebacterium glutamicum. In this study, the promoter library-based module combination (PLMC) technology was developed to efficiently optimize the expression of genes in C. glutamicum. A random promoter library was designed to contain the putative - 10 (NNTANANT) and - 35 (NNGNCN) consensus motifs, and refined through a three-step screening procedure to achieve numerous genetic control elements with different strength levels, including fluorescence-activated cell sorting (FACS) screening, agar plate screening, and 96-well plate screening. Multiple conventional strategies were employed for further precise characterizations of the promoter library, such as real-time quantitative PCR, sodium dodecyl sulfate polyacrylamide gel electrophoresis, FACS analysis, and the lacZ reporter system. These results suggested that the established promoter elements effectively regulated gene expression and showed varying strengths over a wide range. Subsequently, a multi-module combination technology was created based on the efficient promoter elements for combination and optimization of modules in the multi-gene pathways. Using this technology, the threonine biosynthesis pathway was reconstructed and optimized by predictable tuning expression of five modules in C. glutamicum. The threonine titer of the optimized strain was significantly improved to 12.8 g/L, an approximate 6.1-fold higher than that of the control strain. Overall, the PLMC technology presented in this study provides a rapid and effective method for combination and optimization of multi-gene pathways in C. glutamicum.

  7. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  8. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  9. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  10. Survey of Security Technologies on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuwei Yang

    2015-01-01

    Full Text Available Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized research progress of sensor network security issues as three aspects, key management, authentication, and secure routing, analyzed and commented on these results advantages and disadvantages and pointed out the future direction of the hot research field.

  11. New trends in science and technology implications for international peace and security

    International Nuclear Information System (INIS)

    1991-01-01

    In December 1988, the General Assembly requested the Secretary-General to follow future scientific and technological developments, especially those with potential military applications, and to evaluate their impact on international security. In resolution 43/77 A it also requested the Secretary-General to report to it at its forty-fifth session. The broad fields in which scientific and technological developments are taking place were identified as: information technology, biotechnology, materials technology, nuclear technology and space technology. These assessments were discussed by a wider group of experts at a high-level conference on ''New trends in science and technology: implications for international peace and security'', held in April 1990 in the city of Sendai, Japan. The Conference, which was attended by nearly 100 participants from over 20 countries, addressed issues of technological change and global security, new technologies and the search for security in the post-cold-war era, and national policy-making and international diplomacy in an era of rapid technological change. General approaches to technology assessment and technology trends in selected areas were also discussed. The positions taken by Member States on the subject of establishing a mechanism for technology assessment were also taken into account. The highlights of the report are summarized

  12. Practices and technologies in hazardous material transportation and security.

    Science.gov (United States)

    2011-11-23

    "The University of Arkansas (UA) team is responsible for investigating practices of : hazardous material transportation in the private sector. The UA team is a subcontractor : to the project Petrochemical Transportation Security, Development of...

  13. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  14. Technology safeguards needed as security rule audits loom.

    Science.gov (United States)

    Gersh, Deborah; Hoey, Laura G; McCrystal, Timothy M; Tolley, David C

    2012-05-01

    The Department of Health and Human Services will conduct security rule audits that will involve on-site visits and include: Compliance-focused interviews with key organizational leaders. Scrutiny of physical operations controls, especially regarding storage, maintenance, and use of protected health information. Assessment of organizational policies and procedures to ensure compliance with privacy and security rules. Identification of regulatory compliance areas of concern.

  15. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  16. Adaptive security systems -- Combining expert systems with adaptive technologies

    Energy Technology Data Exchange (ETDEWEB)

    Argo, P.; Loveland, R.; Anderson, K. [and others

    1997-09-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

  17. Reviews of computing technology: Securing network applications, Kerberos and RSA

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, S.M.

    1992-06-01

    This paper will focus on the first step in establishing network security, authentication, and describe the basic function of both RSA and Kerberos as used to provide authentication and confidential data transfer services. It will also discuss the Digital Signature Standard and the market acceptance of each. Proper identification of the principals involved in a network dialog is a necessary first step in providing network-wide security comparable to that of stand-alone systems.

  18. Adaptive security systems -- Combining expert systems with adaptive technologies

    International Nuclear Information System (INIS)

    Argo, P.; Loveland, R.; Anderson, K.

    1997-01-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting

  19. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Technology Solutions Central Security Services Dresher, Pennsylvania; TA-W-82,634A, Prudential Global Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential...

  20. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... 1974; Department of Homeland Security/ALL-004 General Information Technology Access Account Records..., Department of Homeland Security/ALL-004 General Information Technology Access Account Records System of... name: DHS/ALL-004 General Information Technology Access Account Records System of Records. Security...

  1. Factors Influencing Adoption of Information Technology Infrastructure Library: Utilizing the Technology Acceptance Model (TAM)

    Science.gov (United States)

    Cox, Din S. Z.

    2013-01-01

    There is a shortage of evidence based research that provides organizations with the necessary information in support of their technology adoption decisions in relation to ITSM technologies. As such, this research study attempted to bridge the gap by offering insight on possible factors that could influence such decisions. An examination of…

  2. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...

  3. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As... Federal Information Technology Resources (January 2010) (a) Applicability. This clause applies whether the...

  4. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...

  5. Technology scale and supply chains in a secure, affordable and low carbon energy transition

    International Nuclear Information System (INIS)

    Hoggett, Richard

    2014-01-01

    Highlights: • Energy systems need to decarbonise, provide security and remain affordable. • There is uncertainty over which technologies will best enable this to happen. • A strategy to deal with uncertainty is to assess a technologies ability to show resilience, flexibility and adaptability. • Scale is important and smaller scale technologies are like to display the above characteristics. • Smaller scale technologies are therefore more likely to enable a sustainable, secure, and affordable energy transition. - Abstract: This research explores the relationship between technology scale, energy security and decarbonisation within the UK energy system. There is considerable uncertainty about how best to deliver on these goals for energy policy, but a focus on supply chains and their resilience can provide useful insights into the problems uncertainty causes. Technology scale is central to this, and through an analysis of the supply chains of nuclear power and solar photovoltaics, it is suggested that smaller scale technologies are more likely to support and enable a secure, low carbon energy transition. This is because their supply chains are less complex, show more flexibility and adaptability, and can quickly respond to changes within an energy system, and as such they are more resilient than large scale technologies. These characteristics are likely to become increasingly important in a rapidly changing energy system, and prioritising those technologies that demonstrate resilience, flexibility and adaptability will better enable a transition that is rapid, sustainable, secure and affordable

  6. MIT Lincoln Laboratory: Technology in Support of National Security

    Science.gov (United States)

    2011-01-01

    Carter, Cathy Ho, Ngaire Underhill, Sara James, Jessica Olszta, Jessica Brooks, Melissa May, and Rodolfo Cuevas. Because Lincoln Laboratory is at the...Corporation Applicon Arcon Corporation Ascension Technology Atlantic Aerospace Electronics Axsun Technologies Broadcloud Communications Carl Blake

  7. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  8. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    Science.gov (United States)

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  9. Making the most of RFID in libraries

    CERN Document Server

    Palmer, Martin

    2009-01-01

    The advantage of radio frequency identification (RFID) over other technologies used in libraries is usually seen to be its ability to combine the functions of the barcode and the security tag, but with the added advantage of not needing line of sight. This book considers the benefits of installing RFID technology; and work with vendors.

  10. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  11. The Role of Agricultural Technology in Food and Nutritional Security ...

    African Journals Online (AJOL)

    Agriculture, the most important industry in Africa, has not provided adequate food security and economic well-being for the continent's population. Agricultural production per capita and total exports declined since the 1970s, while population and urbanization increases resulted in growing demand. This inadequate ...

  12. The Effects of Information Technology on Library and Documentation Centers: A Review of Social, Structural, Managerial and Functional Aspects

    Directory of Open Access Journals (Sweden)

    Mesut Kurulgan

    2013-11-01

    Full Text Available In the context of protecting academic and cultural heritage, the purpose of libraries and information and documentation centers is to research, document, and archive and to transfer to future generations, domestically and internationally, a society ’s culture. This study examines the structural, functional and administrative innovations that have resulted from the implementation of information technology (IT in libraries since the 1990 ’s. The study also mentions how IT can be used in an efficient way in libraries and information and documentation centers.

  13. 9th International Bielefeld Conference 2009: Upgrading the eLibrary: Enhanced Information Services Driven by Technology and Economics

    Directory of Open Access Journals (Sweden)

    Almuth Gastinger

    2009-10-01

    Full Text Available Thisarticle reports on the 9th International Bielefeld Conference ‘Upgrading the eLibrary: Enhanced Information Services Driven by Technology and Economics’, 3-5 February 2009, in Bielefeld, Germany. The conference focused on future challenges for libraries regarding the development of information services and infrastructures that meet the changing needs of scholarly communication, collaboration (e-science and publication (open access as well as new requirements regarding teaching and learning (virtual learning spaces. In addition attention was paid to economic conditions and strategic positioning of libraries as a general framework for information services.

  14. Sécurité, justice et technologies Security, Justice and Technologies

    Directory of Open Access Journals (Sweden)

    Jean-Charles Froment

    2011-10-01

    Full Text Available Les réflexions qui structurent cet article sont issues de près de quinze années d’observation du développement du recours aux nouvelles technologies de contrôle dans le champ de la justice et de la sécurité. Elles s’appuient plus spécifiquement sur l’étude de deux d’entre elles, principalement le placement sous surveillance électronique et accessoirement la vidéosurveillance, qui ont vu leur champ d’application s’élargir considérablement en l’espace d’une vingtaine d’années. De ces travaux se dégagent neuf clés de lecture à partir desquelles on peut analyser les caractéristiques et l’impact du développement de ces technologies (la vitesse de circulation des modèles ; le jeu du marché ; la question du contrôle ; les formes de la désinstitutionnalisation du pouvoir ; la problématique des libertés ; la plasticité des usages ; les stratégies de légitimation ; les enjeux de régulation ; l’insuffisance d’évaluation.This analysis is based over 15 years of investigation about new technologies in the field of justice and security, and more specifically about electronic monitoring and CCTV which have known a strong development for the last twenty years... From these reflections, Jean-Charles Froment introduces nine analysis keys about the characteristics and the impact of the development of this technologies (speed of policy transfer; rules of market; progressive change towards a «society of control»; power conversions; human rights; plasticity of uses; legitimacy strategies; regulation challenges; weakness of evaluation.

  15. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  16. 2007 Heartland Security Conference and Exhibition - Technology for Defense and Homeland Security Readiness

    Science.gov (United States)

    2007-07-11

    small combustion turbines, solid oxide and other fuel cells, photovoltaics, superconducting magnetic energy storage (SMES), transportable battery...Production Food Processing Pharmaceuticals FoodFood Industrial Production Chemical Production Textiles Plastics Food Food Processing Cosmetics ...Objective 3 Relevance To Homeland Security 4 Care Givers During SARS Healthcare providers acquired SARS despite despite masks and respirators Toronto

  17. U.S. Public Libraries and Web Technologies: What's Happening Now?

    Science.gov (United States)

    Helgren, Jamie E.; Lietzau, Zeth

    2011-01-01

    In 2008, we started by pulling a sample of 483 public libraries from across the country, using 2007 public library annual report data. Because small libraries have different needs and resources than larger libraries, we stratified the sample to make comparisons by size, according to the following population groups: fewer than 10,000 served;…

  18. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Brown, G.E. Jr.

    1990-01-01

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world's inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  19. Information technology convergence security, robotics, automations and communication

    CERN Document Server

    Barolli, Leonard; Xhafa, Fatos; Jeong, Hwa-Young

    2013-01-01

    Information technology and its convergence issue is emerging rapidly as an exciting new paradigm with user-centric environment to provide computing and communication services. This area will be the most comprehensive topics with various aspects of advances in information technology and its convergence services. This book covers all topics as computational science and applications, electronics engineering, manufacturing technology, services, technical skill to control the robot, automatic operation and application, simulation and testing communication and many more.

  20. Survey of Collaboration Technologies in Multi-level Security Environments

    Science.gov (United States)

    2014-04-28

    Dickson. 1996. "Teams in Organizations: Recent Research on Performance and Effectiveness". Annual Review of Psychology , 47:307-338. [32] Hall, D.L... Psychology , 94, 2, 535-546. [48] Moore, J.A. (2002). JView: an information visualization paradigm. Proc. SPIE, Vol. 4716, 367-374. In Enabling...date. Multilevel security solutions like the Multi-Layer Access Solution were developed by Gestalt and MAXIM Systems before these companies became

  1. Using automatic identification system technology to improve maritime border security

    OpenAIRE

    Lindstrom, Tedric R.

    2014-01-01

    Approved for public release; distribution is unlimited Our coastal waters are the United States’ most open and vulnerable borders. This vast maritime domain harbors critical threats from terrorism, criminal activities, and natural disasters. Maritime borders pose significant security challenges, as nefarious entities have used small boats to conduct illegal activities for years, and they continue to do so today. Illegal drugs, money, weapons, and migrants flow both directions across our ma...

  2. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A.H.M Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  3. Utilization of Information and Communication Technology (ICT) Resources and Job Effectiveness among Library Staff in the University of Calabar and Cross River University of Technology, Nigeria

    Science.gov (United States)

    Ntui, Aniebiet Inyang; Inyang, Comfort Linus

    2015-01-01

    This study investigated utilization of Information and Communication Technology (ICT) resources and job effectiveness among library staff in the University of Calabar and Cross River University of Technology, Nigeria. To achieve the purpose of this study, four hypotheses were formulated to guide the study. Ex-post facto research design was adopted…

  4. Information Technology and Library Management. Festschrift in Honour of Margaret Beckman. Papers Presented at the International Essen Symposium (13th, Essen, West Germany, October 22-25, 1990).

    Science.gov (United States)

    Helal, Ahmed H., Ed.; Weiss, Joachim W., Ed.

    The 16 papers in this collection focus on the impact of new technologies on libraries and their managers: (1) "Has Technology Failed Us?" (Frederick W. Lancaster); (2) "The Wheel of Fortune: Academic Libraries. IT and the Re-emerging Past" (Alasdair Paterson); (3) "Management Strategies for Enhancing the Adoption of Technological Innovations"…

  5. The Technology Security Program. A Report to the 99th Congress, Second Session

    Science.gov (United States)

    1986-01-01

    for benevolent and modest purposes; SThe USSR does not depend on Western technology because it: is a Sreat s cientific and technological power; "The...Committee 01 Apr Swiss Minister of Defense 01 Apr FRG Minister of Defense 02 Apr National Security Industrial Assdciation 15 Apr South Korean

  6. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    Science.gov (United States)

    2016-05-01

    early and as far away as possible requires that the United States apply technological solutions in cooperation with tourism , trade, and security...Developing new technologies to reduce or eliminate the energy supply chain for our deployed military can save resources and improve the operational

  7. Beyond the Book: Technology Integration into the Secondary School Library Media Curriculum. Library and Information Problem-Solving Skills Series.

    Science.gov (United States)

    Doggett, Sandra L.

    After exploring the pros and cons of using various technologies in secondary schools, as well as the development of an Acceptable Use Policy, this book describes how technology affects the role and interaction of media specialists, teachers, students, administrators, and parents. Technology planning tips are given on methods to research trends,…

  8. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  9. Security of OS-level virtualization technologies: Technical report

    OpenAIRE

    Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.

    2014-01-01

    The need for flexible, low-overhead virtualization is evident on many fronts ranging from high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study of OS-level virtualization from the point of view of security. In this report, we conduct a comparative study of several OS-level v...

  10. Sharing of information and knowledge among staff in King Abdullah University of Science and Technology (KAUST) library

    KAUST Repository

    Ramli, Rindra M.

    2011-03-01

    This paper describes strategies and initiatives undertaken by the King Abdullah University of Science and Technology (KAUST) library in sharing information and knowledge among its staff. KAUST Library adopted several IT platforms to enable staff to contribute, share, collaborate, extract and act upon knowledge in order to serve our users better. They include: Sharepoint and Google Docs. As Duffy (2000) stated, that “success depends on capitalizing on every available resource including what a company knows and how it uses what it knows”. Therefore, to provide value-added services to our community of researchers and academicians, library staff needs to be equipped with the right skills and tools to be able to act upon users’ inquiries and information needs. KAUST library which was opened in Aug 2009 aims to support education and advanced scientific research. With its state of the art learning and information resource center, the library provides instructional assistance and reference services to its research and academic community. With the influx of information coupled the pervasive use of information technology and Web2.0, the library has to grapple with the issue of information overload. It is important to be able to sieve through the rubbles of information to apply the relevant ones during the point of transaction. Based on our experience in using various IT platforms, this paper will share the impacts of such tools. Lessons learnt and future directions in this area will also be discussed.

  11. Green Building Retrofit for the Library of Indian Institute Technology, Roorkee

    Science.gov (United States)

    Naphade, A.; Sharma, A.; Chani, P. S.; Garg, P.

    2013-03-01

    The major focus world over is on constructing environment friendly buildings. Buildings symbolize uncontrolled consumption of energy and natural resources and also have negative environmental impact. In India, the residential and commercial sector consumes 30 % of the total electricity usage of the country and a major portion of this is used in buildings. Designing and developing new buildings based on the energy efficiency concept and applying retrofit options to the existing buildings could improve the energy use in the building sector. This paper studies an existing building, Central Library of Indian Institute of Technology Roorkee, and recommends retrofit options for sustainable aspects such as site planning, energy and water use, materials and resources and indoor environment quality. The results of this study can be utilized for green retrofits of the other buildings in the campus.

  12. Day, night and all-weather security surveillance automation synergy from combining two powerful technologies

    International Nuclear Information System (INIS)

    Morellas, Vassilios; Johnson, Andrew; Johnston, Chris; Roberts, Sharon D.; Francisco, Glen L.

    2006-01-01

    Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff and landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)

  13. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  14. Microsoft Technology as an Optimization Tool in Promoting Security and Functionality of the Educational System

    Directory of Open Access Journals (Sweden)

    Jelena Jardas Antonic

    2008-10-01

    Full Text Available Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and security situation of information infrastructure has been initiated in 24 schools in the authority of the city. Having completed the multicriteria analysis of the collected data, we have built a model of implementing Microsoft service technologies. The implementation should satisfy the elementary security principles that are required by the security standards today, maximizing functionality of infrastructure and minimizing network administration tasks. Server technology that has been used in this solution is Microsoft Widows 2003 Server R2 and Internet Security and Acceleration Server 2006, as well as the GFI WebMonitor and antivirus.

  15. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  16. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  17. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  18. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  19. Challenges of Information Technology Security in the NASA Environment

    Science.gov (United States)

    Santiago, S. S.

    2000-01-01

    A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.

  20. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  1. Nuclear data, cross section libraries and their application in nuclear technology

    International Nuclear Information System (INIS)

    1985-01-01

    These proceedings contain the articles presented at the named seminar. The articles deal with evaluated nuclear data libraries, computer codes for neutron transport and reactor calculations using nuclear data libraries, and the application of nuclear data libraries for the calculation of the interaction of neutron beams with materials. (HSI)

  2. Using Mobile Technology to Observe Student Study Behaviors and Track Library Space Usage

    Science.gov (United States)

    Thompson, Susan

    2015-01-01

    Libraries have become increasingly interested in studying the use of spaces within their buildings. Traditional methods for tracking library building use, such as gate counts, provide little information on what patrons do once they are in the library; therefore, new methods for studying space usage are being developed. Particularly promising are…

  3. Finding the right technology solutions to secure our borders

    CSIR Research Space (South Africa)

    Venter, CP

    2015-10-01

    Full Text Available stream_source_info Venter-2015.pdf.txt stream_content_type text/plain stream_size 1509 Content-Encoding UTF-8 stream_name Venter-2015.pdf.txt Content-Type text/plain; charset=UTF-8 Finding the right technology solutions...

  4. Newer Technologies for School Security. ERIC Digest Number 145.

    Science.gov (United States)

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  5. Agricultural extension, technology adoption and household food security

    NARCIS (Netherlands)

    Santos Rocha, Jozimo

    2017-01-01

    In this thesis, I use experimental and quasi-experimental data from 25 villages and a total of 1,105 farmers from eastern DRC to investigate the relationship among agricultural training, the adoption of agricultural technologies, crop productivity, and household food insecurity and dietary

  6. Technology adoption and food security: the role of the Nigerian ...

    African Journals Online (AJOL)

    The focus of this paper is on the potential role of the Nigerian Agricultural Insurance Scheme (NAIS) in protecting the farmer from the plethora of risks associated with the transfer and introduction of modern technologies. The scheme can improve farmers' access to credit when the insurance contract is used as collateral for ...

  7. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  8. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  9. How Secure Is Education in Information Technology? A Method for Evaluating Security Education in IT

    Science.gov (United States)

    Grover, Mark; Reinicke, Bryan; Cummings, Jeff

    2016-01-01

    As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…

  10. Japanese Technology and U.S. National Security

    Science.gov (United States)

    1990-12-01

    equipment, biotechnological fermentation processes, and key components of fiber optic technology such as light sources.84 Historically, American...expenditures went for support programs to the public, defense spending came under more scrutiny as an area to save government expenditures. b. "Guns vs. Butter ...discussion concerning "guns vs. butter ," consult G. Adams, "Defense Spending and the Economy," Center on Budget and Policy Priorities, Washington, D.C., Jul

  11. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S.

    2009-11-01

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report

  12. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S

    2009-11-15

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report.

  13. Creating Tomorrow's Technologists: Contrasting Information Technology Curriculum in North American Library and Information Science Graduate Programs against Code4lib Job Listings

    Science.gov (United States)

    Maceli, Monica

    2015-01-01

    This research study explores technology-related course offerings in ALA-accredited library and information science (LIS) graduate programs in North America. These data are juxtaposed against a text analysis of several thousand LIS-specific technology job listings from the Code4lib jobs website. Starting in 2003, as a popular library technology…

  14. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  15. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  16. IRCICA Library UHF RFID Solutions

    Directory of Open Access Journals (Sweden)

    Abdullah Topaloğlu

    2011-03-01

    Full Text Available This article was written with the intention of informing our fellow colleagues about the implementation of UHF RFID (Ultra High Frequency Radio-Frequency Identification which, we think, will be used by libraries all around the world in the future and sharing applications and findings of the archival and documentation section of IRCICA on the subject. IRCICA library has formed the UHF RFID system to find various materials in a reliable and expedient way, to do its counting in a consistent and rapid manner, as well as labeling and controlling various items, controlling and documenting the check-ins and check-outs from the library and setting up a secure and effective circulation of materials within the library. The application of UHF RFID technology has become widespread in the libraries around the world since 2006. As we can surmise from this, the application of UHF RFID technologies is a relatively new step. It would be safe to say that our country has sufficient experience in the application of the mentioned technology and it is even ahead of some library applications in many developed countries.

  17. Technologies for security, military police, and professional policing organizations: the Department of Energy perspective

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    There are many emerging technologies that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: scannerless laser radar; next generation security systems; response force video information helmet system; access delay technologies; rapidly deployable intrusion detection systems; cost risk benefit analysis.

  18. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  19. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  20. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  1. About Place and Role of Information and Communication Technologies, Information Security at the Present Stage

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-12-01

    Full Text Available In the present article author considers questions of importance of information and communication technologies in modern information society and about information security. In the course of the research the author analyzes opinions both known Russian, and famous foreign scientists and practicians from various countries of the world (Italy, the USA, Portugal, etc.. Author emphasizes importance of information and communication technologies at the present stage of development of society and state.

  2. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  3. Risk, security and technology: governing football supporters in the twenty-first century

    NARCIS (Netherlands)

    Spaaij, R.

    2013-01-01

    This paper critically examines the security and risk management technologies that are being used to conduct and pre-empt the behaviour of football supporters. It is shown how, in the Netherlands, pre-emptive risk management in the governing of football supporters involves a dispersed and fragmented

  4. Shock wave science and technology reference library. Vol. 4. Heterogeneous detonation

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Fan (ed.) [Defence Research and Development Canada, Suffield, AB (Canada)

    2009-07-01

    This book, as a volume of the Shock Wave Science and Technology Reference Library, is primarily concerned with detonation waves or compression shock waves in reactive heterogeneous media, including mixtures of solid, liquid and gas phases. The topics involve a variety of energy release and control processes in such media - a contemporary research field that has found wide applications in propulsion and power, hazard prevention as well as military engineering. The six extensive chapters contained in this volume are: - Spray Detonation (SB Murray and PA Thibault) - Detonation of Gas-Particle Flow (F Zhang) - Slurry Detonation (DL Frost and F Zhang) - Detonation of Metalized Composite Explosives (MF Gogulya and MA Brazhnikov) - Shock-Induced Solid-Solid Reactions and Detonations (YA Gordopolov, SS Batsanov, and VS Trofimov) - Shock Ignition of Particles (SM Frolov and AV Fedorov). Each chapter is self-contained and can be read independently of the others, though, they are thematically interrelated. They offer a timely reference, for graduate students as well as professional scientists and engineers, by laying out the foundations and discussing the latest developments including yet unresolved challenging problems. (orig.)

  5. Differential screening of phage-ab libraries by oligonucleotide microarray technology.

    Directory of Open Access Journals (Sweden)

    Paolo Monaci

    Full Text Available A novel and efficient tagArray technology was developed that allows rapid identification of antibodies which bind to receptors with a specific expression profile, in the absence of biological information. This method is based on the cloning of a specific, short nucleotide sequence (tag in the phagemid coding for each phage-displayed antibody fragment (phage-Ab present in a library. In order to set up and validate the method we identified about 10,000 different phage-Abs binding to receptors expressed in their native form on the cell surface (10 k Membranome collection and tagged each individual phage-Ab. The frequency of each phage-Ab in a given population can at this point be inferred by measuring the frequency of its associated tag sequence through standard DNA hybridization methods. Using tiny amounts of biological samples we identified phage-Abs binding to receptors preferentially expressed on primary tumor cells rather than on cells obtained from matched normal tissues. These antibodies inhibited cell proliferation in vitro and tumor development in vivo, thus representing therapeutic lead candidates.

  6. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  7. Who Moved My Intranet? The Human Side of Introducing Collaborative Technologies to Library Staff

    Science.gov (United States)

    Jeffery, Keven; Dworak, Ellie

    2010-01-01

    Intranets can be crucial tools in fostering communication within an academic library. This article describes the successful implementation of an intranet wiki at the San Diego State University Library & Information Access. The steps involved with implementing, marketing, and supporting the MediaWiki software are described, and the results of a…

  8. Technology and Copyright Issues in the Academic Library: First Sale, Fair Use and the Electronic Document.

    Science.gov (United States)

    Ou, Carol

    2003-01-01

    First sale and fair use are two copyright principles of use in academic libraries that need to be reexamined in an information age offering possibilities of universal access and perfect distribution in the electronic document. Library services that are perhaps most affected by these concerns are in provision of electronic reserves and collections.…

  9. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  10. Discovering Drugs with DNA-Encoded Library Technology: From Concept to Clinic with an Inhibitor of Soluble Epoxide Hydrolase.

    Science.gov (United States)

    Belyanskaya, Svetlana L; Ding, Yun; Callahan, James F; Lazaar, Aili L; Israel, David I

    2017-05-04

    DNA-encoded chemical library technology was developed with the vision of its becoming a transformational platform for drug discovery. The hope was that a new paradigm for the discovery of low-molecular-weight drugs would be enabled by combining the vast molecular diversity achievable with combinatorial chemistry, the information-encoding attributes of DNA, the power of molecular biology, and a streamlined selection-based discovery process. Here, we describe the discovery and early clinical development of GSK2256294, an inhibitor of soluble epoxide hydrolase (sEH, EPHX2), by using encoded-library technology (ELT). GSK2256294 is an orally bioavailable, potent and selective inhibitor of sEH that has a long half life and produced no serious adverse events in a first-time-in-human clinical study. To our knowledge, GSK2256294 is the first molecule discovered from this technology to enter human clinical testing and represents a realization of the vision that DNA-encoded chemical library technology can efficiently yield molecules with favorable properties that can be readily progressed into high-quality drugs. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  12. Security

    OpenAIRE

    Leander, Anna

    2009-01-01

    This paper argues that security belongs to a specific category of commodities: “contested commodities” around which there is an ongoing and unsettled symbolic struggle over whether or not they can and should be though of as commodities (section 1). The contested nature of commodification has implications for how markets function; market practices tend to be defined and organized in ways that minimize their contentiousness and obfuscate their expansion. The paper looks at the implications of t...

  13. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1990-01-01

    New technologies are setting a fast pace in our world. Through science and technology we are able to make our world better, richer and more liveable to everyone. However, the new technologies have brought new mans of destruction and have confronted the world with a real prospect of self destruction. This is one of the main challenges of our age. Greater mutual confidence, openness and, if necessary, checks on how scientific and technological co-operation is used must bring down the existing barriers un the area of technological exchanges. The first results are already evident, for instance in the nuclear field. In our age, science and technology are becoming an inherent element in the comprehensive search for a new, post-confrontational system of peace, security and co-operation. United nations, together with its family of specialized agencies, is called upon to play a major positive role in finding approaches in this area. Scientific and technological progress, especially on the eve of a new millennium in the history of mankind, must serve only to enhance international peace and security and, enable everyone to live a full and worthy life

  14. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  15. Graduate Employment Outcomes for Qualifying Library and Records Management Courses at Curtin University of Technology, 1998-2002

    Science.gov (United States)

    Genoni, Paul; Smith, Kerry

    2005-01-01

    This paper reports on the results of a survey of destinations for students from librarianship and records management courses at Curtin University of Technology for the period 1998-2002. The survey includes the type of work currently being undertaken by graduates, the security of tenure in their position, the level of professionalism in their…

  16. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  17. Self Circulation using RFID Technology with KOHA Software at St. Xavier’s College, Kolkata.

    OpenAIRE

    Chattopadhyay, Sougata; Savarimuthu, Xavier

    2017-01-01

    St. Xavier’s College Central Library has installed Radio Frequency IDentification (RFID) technology based kiosk for self circulation through open source library management software KOHA. This technology is also improved library annual stock taking, ensure foolproof security and access control i.e. circulation management. This articles briefly describes why our library switch over from barcode based circulation to RFID based circulation, SWOT analysis of RFID technology, self-circulation using...

  18. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  19. Technology Security Policy: From the Cold War to the New World Order

    Science.gov (United States)

    1993-12-01

    Alic. Lemis M. Branscomb, Harvey Brooks, Ashton B. Carter, and Gerald L. Epstein, Beyond Spinoff: Military and Commercial Technologies in a Changing...97. Is Aaron Karp , "Controlling Weapons Proliferation: The Role of Export Controlw The Journal of Strategic Studies, March 1993, p. 24. 19 Balancing...The National Interest: U.S. National Security Export Controls and Global Economic Competition, op. cit., p. 98. 20 Karp , op. cit., p. 40. 21

  20. Factors affecting food security and contribution of modern technologies in food sustainability.

    Science.gov (United States)

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels. Copyright © 2011 Society of Chemical Industry.

  1. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  2. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  3. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems; (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis

  4. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  5. Microcontroller-based Vehicle Security System with Tracking Capability using GSM and GPS Technologies

    Directory of Open Access Journals (Sweden)

    Engr. Orven F. Mendoza

    2017-05-01

    Full Text Available The security of vehicles is ext remely essential for vehicle owners especially to those whose hard - earned income was used to avail of one or simply, its loss would mean inconveniences to family and work. With these, it becomes the major problem of every vehicle owner. This thesis, Microc ontroller - based Vehicle Security System with Tracking Capability using GSM and GPS Technologies, is a system that can be used to increase vehicle security, as it can track location of missing vehicle, and help authorities have credible evidence that the ve hicle is stolen. The project uses the Global System for Mobile (GSM and the Global Positioning System (GPS technology, which includes the use of GPS receiver module, GSM module, and microcontroller as its primary components. It also uses a vibration sens or that senses vehicle movement and a buzzer that sends an alarm when sensors are triggered. A confirmation message is sent to the vehicle owner of the vehicle by the device. The system also features capability of tracking the location of the vehicle with the help of the GPS receiver which gives data to the location of the vehicle by way of coordinates. These coordinates provide exact location of the motor vehicle. The SMS message that the vehicle owner will send to the device attached to the vehicle should follow correct format of limitation for successful use and the use of the four character password followed by the command. The command is for power switching or activating automatically the key switch, engine and alarm. If not observed, the device would not work. The project is deemed to provide vehicle owners the security of their vehicle. The system will not only ensure vehicle security but also lessen the threats on vehicles.

  6. Providing Cryptographic security and evidentiary Chain-of-Custody with the advanced forensic format, library, and tools

    OpenAIRE

    Garfinkel, Simson L.

    2011-01-01

    This paper presents improvements in the Advanced Forensics Format Library version 3 that provide for digital signatures and other cryptographic protections for digital evidence, allowing an investigator to establish a reliable chain-of-custody for electronic evidence from the crime scene to the court room. No other system for handling and storing electronic evidence currently provides such capabilities. This paper discusses implementation details, user level commands, and the AFFLIB progra...

  7. Construction and screening of vast libraries of natural product-like macrocyclic peptides using in vitro display technologies.

    Science.gov (United States)

    Bashiruddin, Nasir K; Suga, Hiroaki

    2015-02-01

    Macrocyclic structure and backbone N-methylation represent characteristic features of peptidic natural products, which play critical roles in their biological activity. Although natural products have been the traditional source of such peptides, recent developments in synthesizing natural product-like macrocyclic peptides using reconstituted translation systems have enabled us to construct vast trillion-member libraries of non-standard macrocyclic peptides. In addition, a method for displaying such libraries on their corresponding mRNA templates allows us to rapidly screen them for potent ligands against various drug targets. This review describes methodologies for the ribosomal synthesis of novel natural product-like macrocyclic peptides and their recent applications in the discovery of bioactive molecules using in vitro display technologies. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  8. Creation of a Library Tour Application for Mobile Equipment using iBeacon Technology

    Directory of Open Access Journals (Sweden)

    Jonathan Bradley

    2016-04-01

    Full Text Available We describe the design, development, and deployment of a library tour application utilizing Bluetooth Low Energy devices know as iBeacons. The tour application will serve as library orientation for incoming students. The students visit stations in the library with mobile equipment running a special tour app. When the app detects a beacon nearby, it automatically plays a video that describes the current location. After the tour, students are assessed according to the defined learning objectives. Special attention is given to issues encountered during development, deployment, content creation, and testing of this application that depend on functioning hardware, and the necessity of appointing a project manager to limit scope, define priorities, and create an actionable plan for the experiment.

  9. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  10. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  11. CD-ROM Technology for Reference in Secondary School Library Media Centers.

    Science.gov (United States)

    Mendrinos, Roxanne Baxter

    1992-01-01

    Describes a study of secondary school library media specialists in Maine and Pennsylvania that was conducted to establish a baseline of data relating to the use of CD-ROM databases for reference purposes. Topics addressed include database titles; networking; staffing concerns; budget; funding; attitudes toward CD-ROMs; and training and curriculum…

  12. Speakeasy Studio and Cafe: Information Literacy, Web-based Library Instruction, and Technology.

    Science.gov (United States)

    Jacobs, Mark

    2001-01-01

    Discussion of academic library instruction and information literacy focuses on a Web-based program developed at Washington State University called Speakeasy Studio and Cafe that is used for bibliographic instruction. Highlights include the research process; asking the right question; and adapting to students' differing learning styles. (LRW)

  13. Office Automation and Information Technology Trends--Their Impact on Libraries and Information Center Management.

    Science.gov (United States)

    Mason, Robert M.

    1986-01-01

    Reviews recent research on the rate of implementation and impacts of office automation (i.e., expanding microcomputer use, expert systems, electronic publishing) and outlines how these impacts may lead to changes in roles and services of libraries and information professionals. (Author/MBR)

  14. Field studies of safety security rescue technologies through training and response activities

    Science.gov (United States)

    Murphy, Robin R.; Stover, Sam

    2006-05-01

    This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.

  15. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  16. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  17. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.; Joslyn, Cliff A.; West, Curtis L.; Schanfein, Mark J.; Sayre, Amanda M.

    2017-07-17

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLT to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.

  18. Utilizing Web 2.0 Technologies for Library Web Tutorials: An Examination of Instruction on Community College Libraries' Websites Serving Large Student Bodies

    Science.gov (United States)

    Blummer, Barbara; Kenton, Jeffrey M.

    2015-01-01

    This is the second part of a series on Web 2.0 tools available from community college libraries' Websites. The first article appeared in an earlier volume of this journal and it illustrated the wide variety of Web 2.0 tools on community college libraries' Websites serving large student bodies (Blummer and Kenton 2014). The research found many of…

  19. A Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System

    Directory of Open Access Journals (Sweden)

    Rafiya Hossain

    2017-09-01

    Full Text Available Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system is being introduced in the developing countries to avoid corruption in the collection of toll, decrease cost and increase operational efficiency. The goal of this research is to find an integrated solution that enhances security along with the advantage of automated toll collection. Inspired by the availability of many security systems, this research presents a system that can block a specific vehicle or a particular type of vehicles at the toll booths based on directives from the law enforcement agencies. The heart of the system is based on RFID (Radio Frequency Identification technology. In this system, by sending a text message the law enforcement agency or the authority that controls the toll booths can prevent the barrier from being liftedeven after deduction of the toll charge if the passing vehicle has a security issue. The designed system should help the effort of reducing transport crimes on highways and bridges of developing countries.

  20. The publication of scientific data by World Data Centers and the National Library of Science and Technology in Germany

    Directory of Open Access Journals (Sweden)

    J Brase

    2006-11-01

    Full Text Available In its 2004 report "Data and information", the International Council for Science (ICSU strongly recommended a new strategic framework for scientific data and information. On an initiative from a working group from the Committee on Data for Science and Technology (CODATA, the German Research Foundation (DFG has started the project "Publication and Citation of Scientific Primary Data" as part of the program "Information-infrastructure of network -based scientific-cooperation and digital publication" in 2004. Starting with the field of earth science, the German National Library of Science and Technology (TIB is now established as a registration agency for scientific primary data as a member of the International DOI Foundation (IDF.

  1. Electrical markets, energy security and technology diversification: nuclear as cover against gas and carbon price risks?

    International Nuclear Information System (INIS)

    Roques, F.A.; Newbery, D.M.; Nuttall, W.J.; Neufville, R. de

    2005-01-01

    Recent tension in the oil and gas markets has brought back the concept of energy offer diversification. Electrical production technology diversification in a country helps improve the security of supply and make up for the negative effects of hydrocarbons price variations. The portfolio and real options theories help to quantify the optimum diversification level for a country or a power company. The cover value of a nuclear investment for a power company facing cost uncertainties (price of gas and of carbon dioxide emission permit) and proceeds (price of electricity) is assessed. A strong link between the prices of gas and electricity reduces incentives to private producers to diversify, disputing the capacity of a liberalized electrical market to achieve optimum technology diversity from a domestic point of view. (authors)

  2. Convergence of emerging science and technology trends for defense, security, and human performance

    International Nuclear Information System (INIS)

    Vaseashta, Ashok

    2010-01-01

    sciences and technologies and road-mapping, which describes the emergence and direction of performance, features, or impacts of a science and technology to appear in the future. The development of 'early warning' scanning capabilities to develop awareness and understanding of basic scientific research as well as forthcoming technology and their implications underscore a fundamental change in focus from 'entirely technology-oriented' to 'science based futures-oriented technological approach', echoing the shift in chemical and biological defense strategy from a 'needs-based' to 'capabilities-based' model. The expectation is to minimize the impact of and manage technology uncertainty through exploiting futures-oriented analytical methods, modeling and simulation, and scenario development. The ultimate goal of the IASC futures research is not to predict the future or to influence social decisions in a predictable way. Rather, our aim is visionary to expand research organizations' and scientists' awareness of future threats and opportunities for balanced, strategic S and T analyses and recommendation of revolutionary scientific breakthroughs in support of international security. (author)

  3. Evaluating the influence of information and communications technology on food security

    Directory of Open Access Journals (Sweden)

    Ntabeni J. Jere

    2017-05-01

    Objectives: The study evaluates the influence of ICTs in improving food security in KwaZulu-Natal Province. A theoretical framework was developed as the lens through which diffusion and adoption of ICTs can be understood. The theorised model was developed using constructs from the diffusion of innovation (DOI theory, technology acceptance model (TAM and Hofstede’s cultural dimensions theory. Method: Survey data from 517 smallholder farmers from the district municipality of iLembe were collected using a questionnaire. A quantitative approach was followed, and the developed theorised model was analysed using structural equation modelling techniques. Results: This study proposes that ICT influence on food security is associated with culture, perceived usefulness and perceived ease of use. The study further finds that perceived ease of use of ICTs has the most significant effect with regard to ICT adoption and diffusion amongst smallholder farmers in iLembe district municipality. There are, however, no associations found with perceived attributes of innovation and the nature of social systems. The study consisted of a largely homogeneous social system; therefore, the researcher could not make any comparisons. Conclusion: The proposed framework for evaluating the influence of ICTs on food security put forward in this study highlights a number of issues. Firstly, there is need for further study to be conducted to understand adoption of ICTs specifically for food security. This would help in creating more accurate adoption strategies. Secondly, the study informs ICT innovation developers on the need to prioritise ease of use of ICT-based interventions when developing innovations that focus on smallholder farmers. The study also contributes to policy guidelines and suggests clear guidelines be developed to address cultural aspects such as gender imbalances.

  4. A data-management system using sensor technology and wireless devices for port security

    Science.gov (United States)

    Saldaña, Manuel; Rivera, Javier; Oyola, Jose; Manian, Vidya

    2014-05-01

    Sensor technologies such as infrared sensors and hyperspectral imaging, video camera surveillance are proven to be viable in port security. Drawing from sources such as infrared sensor data, digital camera images and processed hyperspectral images, this article explores the implementation of a real-time data delivery system. In an effort to improve the manner in which anomaly detection data is delivered to interested parties in port security, this system explores how a client-server architecture can provide protected access to data, reports, and device status. Sensor data and hyperspectral image data will be kept in a monitored directory, where the system will link it to existing users in the database. Since this system will render processed hyperspectral images that are dynamically added to the server - which often occupy a large amount of space - the resolution of these images is trimmed down to around 1024×768 pixels. Changes that occur in any image or data modification that originates from any sensor will trigger a message to all users that have a relation with the aforementioned. These messages will be sent to the corresponding users through automatic email generation and through a push notification using Google Cloud Messaging for Android. Moreover, this paper presents the complete architecture for data reception from the sensors, processing, storage and discusses how users of this system such as port security personnel can use benefit from the use of this service to receive secure real-time notifications if their designated sensors have detected anomalies and/or have remote access to results from processed hyperspectral imagery relevant to their assigned posts.

  5. The New Educational Method and Technology in Elementary School : Through the Construction and Use of School Library Website in Elementary School

    OpenAIRE

    金沢, みどり

    2013-01-01

    The new educational method and technology in elementary school have been discussed, especially from the viewpoint of construction and use of school library website. In order to clarify the problems and future perspective of education in elementary school in Japan, we describe the idea of education in new elementary course of study and the meaning of information education. Then, the contents in school library websites in U.S.A. are analyzed by comparison with CIRRI (Core Information Reference ...

  6. Deviant Behaviors in Library Use: A Case Study of Three Universities in Nigeria

    Directory of Open Access Journals (Sweden)

    Ikuomola Adediran Daniel

    2014-06-01

    Full Text Available Research on library deviance in Nigeria has largely relied on librarians’ accounts, which often portray students as “deviants” and libraries as “victims”. However, a holistic account should incorporate narratives from both students and librarians in the analysis of deviant behaviors in library utilization. Some common trends of deviance and the implication on library utility in selected universities were discovered through observations and interviews. The study reveals a gap in the security of students’ personal belongings, inadequate electricity supply, and a wide range of deviant behaviors associated with the use of information and communication technologies (ICT in the library. The impact of these lapses thus put much pressure on both librarians and student users. The study recommends proper funding of libraries to enable the adoption of a 21st Century Library Model, which guarantees a variety of spatial and safety arrangements in curbing the menace of deviants in library utilization.

  7. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  8. Library as a Partner in Co-Designing Learning Spaces: A Case Study at Tampere University of Technology, Finland

    Science.gov (United States)

    Tevaniemi, Johanna; Poutanen, Jenni; Lähdemäki, Riitta

    2015-01-01

    This article presents a case of co-designed temporary learning spaces at a Finnish academic library, together with the results of a user-survey. The experimental development of the multifunctional spaces offered an opportunity for the library to collaborate with its parent organisation thus broadening the role of the library. Hence, library can be…

  9. The library

    International Nuclear Information System (INIS)

    1980-01-01

    A specialized library is essential for conducting the research work of the Uranium Institute. The need was recognized at the foundation of the Institute and a full-time librarian was employed in 1976 to establish the necessary systems and begin the task of building up the collection. A brief description is given of the services offered by the library which now contains books, periodicals, pamphlets and press cuttings, focussed on uranium and nuclear energy, but embracing economics, politics, trade, legislation, geology, mining and mineral processing, environmental protection and nuclear technology. (author)

  10. Smart Buildings: An Introduction to the Library of the Future.

    Science.gov (United States)

    Hoy, Matthew B

    2016-01-01

    Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.

  11. LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY

    Directory of Open Access Journals (Sweden)

    Ramona DUMITRAȘCU

    2017-05-01

    Full Text Available Li-Fi is a wireless technology that transmits high-speed data using visible light communication (VLC, it can achieve speeds of 224 gigabits per second in the lab. The potential Li-Fi technology can change a lot in virtual word considering it can provide transmission at 1 GB per second - that's 100 times faster than current average Wi-Fi speeds. By flickering the light from a single LED, Li-Fi technology can transmit far more data than a cellular tower, using Visible Light Communication (VLC technology - a medium that uses visible light between 400 and 800 terahertz (THz. It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. The benefit of Li-Fi over Wi-Fi, other than potentially much faster speeds, is that because light cannot pass through walls, it makes it a whole lot more secure.

  12. Securing life through technology acceptance: the first six months after transvenous internal cardioverter defibrillator implantation.

    Science.gov (United States)

    Burke, L J

    1996-01-01

    To understand the experience of living with a transvenous internal cardioverter defibrillator (ICD) during the first 6 months after implantation. A grounded theory approach was used to gain an understanding of the antecedents, conditions, and consequences of the core process. Two midwestern community medical centers and patients' homes within a 250-mile radius from the medical centers. Ten women and 14 men between 22 and 78 years of age, who had undergone a new transvenous ICD implantation within the last week. The core process that described the experience of living with a transvenous ICD during the first 6 months after implantation was the process of "securing life through technology acceptance." This core process was characterized by three major categories: choosing life with technology, integrating technology into life, and living life through technology. Nursing interventions related to individualized assessment, education, and counseling are warranted to facilitate patient and family understanding and to plan for the cyclic process involved in integrating a transvenous ICD into their lives. Directions for further research are provided.

  13. Virtual Libraries: Service Realities.

    Science.gov (United States)

    Novak, Jan

    2002-01-01

    Discussion of changes in society that have resulted from information and communication technologies focuses on changes in libraries and a new market for library services with new styles of clients. Highlights client service issues to be considered when transitioning to a virtual library situation. (Author/LRW)

  14. Science and Technology vs. Defense and Security: Dual Use Consequences, a South American Perspective

    International Nuclear Information System (INIS)

    Espona, M. J.

    2007-01-01

    Nowadays we can say that science and technology are development driven forces in most countries, with some exceptions especially in the Southern Hemisphere. Even though, we have to take into account their link to and impact on defense and security and not only when it comes to WMD but also in the economy and academy areas, both in developed and developing countries. Within this framework, when we analyze the spread of technology and knowledge, it is important to consider: the media where it takes place (e.g. journals, internet, conferences, commercial agreements); which the actors involved are (e.g. scientists, governmental agencies, commercial firms); and the motive why it occurs (e.g. scientific discoveries; commercial exchange; international agreements). Once known all these elements, which vary both intracountry and intercountry, we may have a deep and broad enough framework to consider which policies to take in order to foster scientific and technologic development without collaborating with state and non state WMD programs. Although we already have a legal framework to fight against WMD proliferation and terrorism, the diverse degree of success of such instruments makes it necessary to continue analyzing and debating ways to strengthen them and/or find new ones. Therefore, in this paper we will analyze how the phenomena of science and technology development and spread impacts on defense and security from a South American perspective, taking into account the particular differences among developed and developing countries. Among the primary findings we can mention the existing differences between countries when it comes to the place (military, academic or commercial ones) where the critical science and technology innovative developments take place; the origin of funding (private or governmental); the existence and fulfillment of plans to foster science and technology development; and the scientific community awareness in WMD topics. All these elements have a

  15. Hybrid Placemaking in the Library: Designing Digital Technology to Enhance Users' On-Site Experience

    Science.gov (United States)

    Bilandzic, Mark; Johnson, Daniel

    2013-01-01

    This paper presents research findings and design strategies that illustrate how digital technology can be applied as a tool for "hybrid" placemaking in ways that would not be possible in purely digital or physical spaces. Digital technology has revolutionised the way people learn and gather new information. This trend has challenged the…

  16. The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology

    OpenAIRE

    Barskar, Raju; Deen, Anjana Jayant; Bharti, Jyoti; Ahmed, Gulfishan Firdose

    2010-01-01

    E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. Ecommerce is not appro...

  17. Preparation of Low-Input and Ligation-Free ChIP-seq Libraries Using Template-Switching Technology.

    Science.gov (United States)

    Bolduc, Nathalie; Lehman, Alisa P; Farmer, Andrew

    2016-10-10

    Chromatin immunoprecipitation (ChIP) followed by high-throughput sequencing (ChIP-seq) has become the gold standard for mapping of transcription factors and histone modifications throughout the genome. However, for ChIP experiments involving few cells or targeting low-abundance transcription factors, the small amount of DNA recovered makes ligation of adapters very challenging. In this unit, we describe a ChIP-seq workflow that can be applied to small cell numbers, including a robust single-tube and ligation-free method for preparation of sequencing libraries from sub-nanogram amounts of ChIP DNA. An example ChIP protocol is first presented, resulting in selective enrichment of DNA-binding proteins and cross-linked DNA fragments immobilized on beads via an antibody bridge. This is followed by a protocol for fast and easy cross-linking reversal and DNA recovery. Finally, we describe a fast, ligation-free library preparation protocol, featuring DNA SMART technology, resulting in samples ready for Illumina sequencing. © 2016 by John Wiley & Sons, Inc. Copyright © 2016 John Wiley & Sons, Inc.

  18. Security Expertise

    DEFF Research Database (Denmark)

    This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  19. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..

  20. Computer Security Concepts and Issues in the Information Technology Management (370) Curriculum

    Science.gov (United States)

    1992-09-01

    5 A. WHAT IS COMPUTER SECURITY? .............................. 5 B. DOD’S INTEREST IN COMPUTER SECURITY ..................... 6 1. 1989 U.S...of information used. 4 IL COMPUTER SECURITY AND DOD A. WHAT IS COMPUTER SECURITY? In the aftermath of numerous "electronic break-ins" to sensitive

  1. Food safety and quality through radiation technology: its implications to national security

    International Nuclear Information System (INIS)

    Lanuza, Luvimina G.

    2012-08-01

    showed that the dose used did not modify the sensory properties in such a way that they were detected by both sets of respondents. The study recommended that food irradiation technology be adopted by the national government as one of the means to achieve national food security. The results of this study provide science-based evidence in collaborating previous studies on the role of food irradiation technology in ensuring food security such as when used for post-harvest treatment of agricultural crops and for quarantine treatment of fruits and vegetables for export. It must, however, be recognized that the general population may still have fear of radiation. As such, a concerted effort using the quad-media and other government instrumentalities be utilized to effect a paradigm shift of the populace and increase public awareness and acceptance of irradiated food. One can rightly say that food irradiation technology is a tool for national development, and enhances national security through food security. (author)

  2. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives

    Directory of Open Access Journals (Sweden)

    Delphine Christin

    2010-04-01

    Full Text Available Wireless Sensor Networks (WSNs are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by the industrial automation community is impeded by open issues, such as security guarantees and provision of Quality of Service (QoS. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine QoS requirements and carry out a threat analysis, which act as basis of our evaluation of the current state-of-the-art. According to the results of this evaluation, we identify and discuss open research issues.

  3. What Technology Skills Do Developers Need? A Text Analysis of Job Listings in Library and Information Science (LIS from Jobs.code4lib.org

    Directory of Open Access Journals (Sweden)

    Monica Maceli

    2015-09-01

    Full Text Available Technology plays an indisputably vital role in library and information science (LIS work; this rapidly moving landscape can create challenges for practitioners and educators seeking to keep pace with such change.  In pursuit of building our understanding of currently sought technology competencies in developer-oriented positions within LIS, this paper reports the results of a text analysis of a large collection of job listings culled from the Code4lib jobs website.  Beginning over a decade ago as a popular mailing list covering the intersection of technology and library work, the Code4lib organization's current offerings include a website that collects and organizes LIS-related technology job listings.  The results of the text analysis of this dataset suggest the currently vital technology skills and concepts that existing and aspiring practitioners may target in their continuing education as developers.

  4. Application of RFID technology in Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat

    OpenAIRE

    Ghosh, T. B.

    2007-01-01

    RFID (Radio Frequency Identification) is the latest technology to be used in different industries for security and theft detection. In this paper the concept of RFID is defined. Components of RFID Systems used by the SVNIT library are discussed. Advantages, shortcomings and remedies of RFID systems, and financial implications are explained with special reference to SVNIT library, Surat.

  5. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  6. AlphaCo: A Teaching Case on Information Technology Audit and Security

    Directory of Open Access Journals (Sweden)

    Hüseyin Tanriverdi

    2006-03-01

    Full Text Available Recent regulations in the United States (U.S. such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal control mechanisms that minimize them have become important and created an urgent need for professionals who are equipped with IT audit and security skills and knowledge. However, there is severe shortage of teaching cases that can be used in courses aimed at training such professionals. This teaching case begins to address this gap by fostering classroom discussions around IT audit and security issues. It revolves around a hacking incident that compromised online order processing systems of AlphaCo and led to some fraudulent activity. The hacking incident raises a series of questions about IT security vulnerabilities, internal control deficiencies, integrity of financial statements, and independent auditors’ assessment of fraud in the context of the Sarbanes-Oxley Act. The case places students in the roles of executives, IT managers, and auditors and encourages them to discuss several important questions: how and why did the hacking incident happen; what harm did it cause to the firm; how can the firm prevent such hacking incidents in the future; if they do happen, how can the firm detect hacking incidents and fraud sooner; how do auditors assess the impact of such incidents in the context of a financial statement audit; and whether the management

  7. Synthetic Oligosaccharide Libraries and Microarray Technology: A Powerful Combination for the Success of Current Glycosaminoglycan Interactomics.

    Science.gov (United States)

    Pomin, Vitor H; Wang, Xu

    2017-11-20

    Glycosaminoglycans (GAGs) are extracellular matrix and/or cell-surface sulfated glycans crucial to the regulation of various signaling proteins, the functions of which are essential in many pathophysiological systems. Because structural heterogeneity is high in GAG chains and purification is difficult, the use of structurally defined GAG oligosaccharides from natural sources as molecular models in both biophysical and pharmacological assays is limited. To overcome this obstacle, GAG-like oligosaccharides of well-defined structures are currently being synthesized by chemical and/or enzymatic means in many research groups around the world. These synthetic GAG oligosaccharides serve as useful molecular tools in studies of GAG-protein interactions. In this review, besides discussing the commonest routes used for the synthesis of GAG oligosaccharides, we also survey some libraries of these synthetic models currently available for research and discuss their activities in interaction studies with functional proteins, especially through the microarray approach. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. New flexible origination technology based on electron-beam lithography and its integration into security devices in combination with covert features based on DNA authentication

    Science.gov (United States)

    Drinkwater, John K.; Ryzi, Zbynek; Outwater, Chris S.

    2002-04-01

    Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.

  9. ICT Use: Educational Technology and Library and Information Science Students' Perspectives--An Exploratory Study

    Science.gov (United States)

    Aharony, Noa; Shonfeld, Miri

    2015-01-01

    This study seeks to explore what factors influence students' ICT use and web technology competence. The objectives of this study are the following: (a) To what extent do certain elements of Rogers' (2003) Diffusion of Innovations Theory (DOI) explain students' ICT use, (b) To what extent do personality characteristics derived from the Big Five…

  10. Electronic Reading and Digital Library Technologies: Understanding Learner Expectation and Usage Intent for Mobile Learning

    Science.gov (United States)

    Hyman, Jack A.; Moser, Mary T.; Segala, Laura N.

    2014-01-01

    Mobile information technology is changing the education landscape by offering learners the opportunity to engage in asynchronous, ubiquitous instruction. While there is a proliferation of mobile content management systems being developed for the mobile Web and stand-alone mobile applications, few studies have addressed learner expectations and…

  11. Globalization, Information Technology and Higher Education in Nigeria: The Roles of Library Professionals

    Science.gov (United States)

    Uwhekadom, Ejimaji Emmanuel; Olawolu, Oladunni Elizabeth

    2013-01-01

    The influence of globalization and information technology on higher education in Nigeria was investigated through a descriptive survey design. Forty-five professional librarians from University of Port Harcourt, Port Harcourt, Ignatius Ajuru University of Education, Rumuolumeni Port Harcourt, Federal College of Education (Technical) Omoku Rivers…

  12. Research and Advanced Technology for Digital Libraries : 21st International Conference on Theory and Practice of Digital Libraries, TPDL 2017, Thessaloniki, Greece, September 18-21, 2017 : proceedings

    NARCIS (Netherlands)

    Kamps, J.; Tsakonas, G.; Manolopoulos, Y.; Iliadis, L.; Karydis, I.

    2017-01-01

    This book constitutes the proceedings of the 21st International Conference on Theory and Practice of Digital Libraries, TPDL 2017, held in Thessaloniki, Greece, in September 2017. The 39 full papers, 11 short papers, and 10 poster papers presented in this volume were carefully reviewed and selected

  13. The Effects of Information Technology on Functions of Planning and Organizing in the University Libraries and a Study on the Turkish case

    Directory of Open Access Journals (Sweden)

    Mesut Kurulgan

    2005-03-01

    Full Text Available Rapid changes in information technology (IT and a growing downward tendency in the cost of computer hardware, involve the use of IT in the university libraries excessively. University libraries have to make some changes in their organisational processes and bodies in order to be able to use the technology effectively. In this sense, the aim of this study is to determine the university library managers' opinions in Turkey on the effects of ITs on planning and organisation which are the basic managing functions and is to determine if these effects have meaningful differences according to personal and organisational variables. This study aims to light the way for other studies in the field since it is the first example in this field.

  14. Effective Remote Control of Several Outdoor Security Lights by SMS and Wifi Technology

    Directory of Open Access Journals (Sweden)

    M. F. Akorede

    2017-08-01

    Full Text Available The aim of this study was to design and develop a control system using Short Message Service (SMS and wireless networking (WiFi technology to remotely control outdoor security lights in large organisations. The device comprises four main units, namely: the mobile phone or a computer system, the Global System for Mobile communication (GSM modem, the switching unit and the WiFi module. One feature that makes the developed system better than other related existing works is its ability to use two means of control. It makes use of WiFi when the operator is within the coverage area of the network of about 100 m to the device, at no cost, otherwise it uses SMS containing certain codes to control the lights. A Subscriber Identity Module (SIM card is placed in the GSM modem and SMS from the transmitter are sent to that mobile number. The module is also constantly checked by the microcontroller unit, processes the information, extracts the message and command from the GSM modem and WiFi module respectively and then acts accordingly. Owing to its simplicity, C programming is used to programme the microcontroller. The developed device when tested with three lighting points operating on 230V power supply, gives an impressive performance in terms of accuracy and promptness with both SMS and WiFi technology.

  15. AlGaInN laser diode technology and systems for defence and security applications

    Science.gov (United States)

    Najda, Stephen P.; Perlin, Piotr; Suski, Tadek; Marona, Lujca; Boćkowski, Mike; Leszczyński, Mike; Wisniewski, Przemek; Czernecki, Robert; Kucharski, Robert; Targowski, Grzegorz; Watson, Scott; Kelly, Antony E.

    2015-10-01

    AlGaInN laser diodes is an emerging technology for defence and security applications such as underwater communications and sensing, atomic clocks and quantum information. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., ~380nm, to the visible ~530nm, by tuning the indium content of the laser GaInN quantum well. Thus AlGaInN laser diode technology is a key enabler for the development of new disruptive system level applications in displays, telecom, defence and other industries. Ridge waveguide laser diodes are fabricated to achieve single mode operation with optical powers up to 100mW with the 400-440nm wavelength range with high reliability. Visible free-space and underwater communication at frequencies up to 2.5GHz is reported using a directly modulated 422nm GaN laser diode. Low defectivity and highly uniform GaN substrates allow arrays and bars to be fabricated. High power operation operation of AlGaInN laser bars with up to 20 emitters have been demonstrated at optical powers up to 4W in a CS package with common contact configuration. An alternative package configuration for AlGaInN laser arrays allows for each individual laser to be individually addressable allowing complex free-space or optical fibre system integration with a very small form-factor.

  16. International Scientific Migration: Progress or a Threat to Russia’s Scientific and Technological Security

    Directory of Open Access Journals (Sweden)

    Viktor Anatolyevich Koksharov

    2018-03-01

    Full Text Available The authors focus on the issues of scientific migration. This trend is relevant from both an academic perspective — studying the individual’s economic behaviour, as well as practical one, because competition for talent has a significant impact on innovation policy initiatives around the world. Most Russian and foreign researchers are unanimous about the main complication for these studies: the lack of reliable information about scientific researchers’ migration. To search for these data, we have developed a methodology implemented in software based on the big data technology. This software allows to analyse data sets from leading scientific citation bases. The information on scientific migration resulted from the analysis of changes in affiliation. We have collected the data on the scientific migration of researchers employed by the Ural Federal University from the Scopus database. The verification of the obtained data showed their high reliability. Most researchers move to Western European countries and the United States (up to 72 %. The main areas of emigrating researchers’ scientific interests are natural and technical sciences. The optimal approach to minimizing the negative impact of scientific migration on Russia’s scientific and technological security is the practical application of the theory of brain sharing. According to this theory, a large scientific diaspora abroad is an essential resource for the development of science and innovation.

  17. The Impact of Information Behavior in Academic Library Service Quality: A Case Study of the Science and Technology Area in Spain

    Science.gov (United States)

    Pinto, Maria; Fernandez-Marcial, Viviana; Gomez-Camarero, Carmen

    2010-01-01

    This research explores the extent of service quality in Spanish university science and technology libraries, based on the expectations and perceptions of their users: faculty and researchers. Users' information behavior is analyzed with the specially designed BiQual tool, which reveals specific needs such as the greater importance of electronic…

  18. Global and Information and Communication Technology (ICT) Changes in Library and Information Studies (LIS): Information Seeking Behaviors of LIS Faculty Members in Thailand

    Science.gov (United States)

    Polparsi, Jomkwan

    2012-01-01

    This study provides an overview of Information and Communication Technology (ICT) in Library and Information Studies (LIS) education in Thailand, focusing on challenges and pressures in the information environment of Thai LIS faculty members. This study employed a qualitative research approach, naturalistic inquiry, and inductive data analysis.…

  19. Measuring the Success of Library 2.0 Technologies in the African Context: The Suitability of the DeLone and McLean's Model

    Science.gov (United States)

    Lwoga, Edda Tandi

    2013-01-01

    Purpose: This study aims to examine the suitability of information systems (IS) success model in the adoption of library 2.0 technologies among undergraduate students in the African context, and focused at the Muhimbili University of Health and Allied Sciences (MUHAS) of Tanzania. Design/methodology/approach: Based on the IS success model, the…

  20. Using Information Technologies in Professional Training of Future Security Specialists in the USA, Great Britain, Poland and Israel

    Science.gov (United States)

    Kyslenko, Dmytro

    2017-01-01

    The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…

  1. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-11-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  2. Library/vendor relationships

    CERN Document Server

    Brooks, Sam

    2014-01-01

    A view of the mutual dependence between libraries and vendorsAs technology advances, libraries are forced to reach beyond their own resources to find effective ways to maintain accuracy and superior service levels. Vendors provide databases and integrated library systems that perform those functions for profit. Library/Vendor Relationships examines the increasing cooperation in which libraries find they must participate in, and vice versa, with the vendors that provide system infrastructure and software. Expert contributors provide insights from all sides of this unique collaboration, offering

  3. 76 FR 30374 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-25

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and... meet certain provisions of the Cruise Vessel Security and Safety Act of 2010(CVSSA), specifically... 27, 2010, Congress enacted the Cruise Vessel Safety and Security Act of 2010 (CVSSA) (Pub. L. 111-207...

  4. On the Move with the Mobile Web: Libraries and Mobile Technologies

    OpenAIRE

    Kroski, Ellyssa

    2008-01-01

    Imagine walking by a movie poster for the upcoming Harry Potter film and scanning it with a click of your camera phone in order to download associated ringtones, get showtimes, or even buy tickets. How about snapping a photo while browsing through a magazine to get a free sample of a new perfume? This may sound like science fiction right now, but in Japan, this type of mobile search technology is widespread, and in the United States similar services are already being developed, services...

  5. An assessment of the effectiveness of fuel cycle technologies for the national energy security enhancement in the electricity sector

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Jun, Eunju; Chang, Soon Heung; Kim, Won Joon

    2009-01-01

    Energy security, in the 21st century, draws significant attention in most countries worldwide, because the national security and sustainable development depend largely on energy security. The anticipated fossil energy depletion and the instability of their supply drive many countries to consider nuclear energy as their alternative energy source for the enhancement of their national energy security. In this study, indicators measuring the level of energy security in the electric power sector are developed and applied for the assessment of the effectiveness of four electric power system schemes which deploy different nuclear fuel cycle technologies, with consideration for the diversification of the energy markets and the vulnerability to economic disruption. Results show that the contribution of the closed fuel cycle scheme is larger than the once-through fuel cycle scheme in the perspective of energy security. In addition, the completely closed fuel cycle with the spent fuel recycling enhances the national energy security to the maximum extent compared to all other fuel cycle schemes. Since a completely closed fuel cycle is hardly affected by the uranium price changes, this scheme is found to be the most favorable scheme, ensuring the stable profit of utilities and stabilizing the electricity tariff. In addition, the completely closed fuel cycle scheme provides the best enhancement of national energy security with respect to energy supply, under reasonable price conditions. The indicators developed in this study can be utilized as a useful instrument for the measurement of the level of the energy security, especially by the countries importing energy resources for the generation of electric power.

  6. 2015 Evidence Analysis Library Systematic Review on Advanced Technology in Food Production.

    Science.gov (United States)

    Edge, Marianne Smith; Kunkel, Mary Elizabeth; Schmidt, Jennifer; Papoutsakis, Constantina

    2018-03-08

    In the late 20th century, plant breeders began using molecular biology techniques such as recombinant DNA, also known as genetic engineering, along with traditional cross-breeding. Ten plant and one animal food have been approved for commercialization in the United States. Today, foods and ingredients from genetically engineered (GE) crops are present throughout the food supply, which has led to varying levels of acceptance. Much discussion exists among consumers and health professionals about the believability of statements made regarding benefits or risks of GE foods. The aim of this systematic review was to examine the evidence on the association of consumption of GE foods and ingredients derived from them on human health, specifically allergenicity, food safety, pesticide consumption, nutrient adequacy, inflammation, and antibiotic resistance. An expert panel conducted a systematic review on advanced technology in food production. The 30 developed questions focused on effects of human consumption of GE foods and the effects of human consumption of foods containing pesticide residues on human health. Primary research published from 1994 to 2014 were identified using PubMed and Agricultural Online Access databases. Additional studies were identified by searching references of review articles. Twenty-one studies met the inclusion criteria. Relevant research addressed five of 30 questions. Four questions focused on food allergenicity, the fifth on nutrient adequacy, and all received a Grade III (limited/weak) rating. No human studies addressed 25 questions on the consumption of foods produced using genetic engineering technologies on gene translocation, cancer, food safety, phenotype expression, inflammation and inflammatory markers, or antibiotic resistance. These questions received a Grade V (grade not assignable). Evidence from human studies did not reveal an association between adverse health effects and consumption of foods produced using genetic engineering

  7. enforcing tertiary school library rules and regulations

    African Journals Online (AJOL)

    2014-10-31

    Oct 31, 2014 ... Such services range from book lending to reference material's access. Of course, beneficiaries must keep ... to lend their library cards to another for the sake of accessing library services. In the event of this, library ... fake library cards, as well as security issues stemming from general lapses, underfunding,.

  8. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  9. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    International Nuclear Information System (INIS)

    Sinars, Daniel; Scott, Kimberly Carole; Edwards, M. John; Olson, Russell Teall

    2016-01-01

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  10. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    Energy Technology Data Exchange (ETDEWEB)

    Eipeldauer, Mary D [ORNL; Shelander Jr, Bruce R [ORNL

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) was established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.

  11. Converting To Digital Library in Banking Organizations : Case Study For Library of Central Bank of Libya

    Directory of Open Access Journals (Sweden)

    Asmaa Basher Abou Louefa

    2005-05-01

    Full Text Available A Case study For Library of Central Bank of Libya, it deals the converting to a digital library. It start with an introduction about digital libraries, and technology in libraries, then deal Library of Central Bank of Libya, and it current situation, then states the plan to be converted to digital library.

  12. Technologies for the Synthesis of mRNA-Encoding Libraries and Discovery of Bioactive Natural Product-Inspired Non-Traditional Macrocyclic Peptides

    Directory of Open Access Journals (Sweden)

    Hiroaki Suga

    2013-03-01

    Full Text Available In this review, we discuss emerging technologies for drug discovery, which yields novel molecular scaffolds based on natural product-inspired non-traditional peptides expressed using the translation machinery. Unlike natural products, these technologies allow for constructing mRNA-encoding libraries of macrocyclic peptides containing non-canonical sidechains and N-methyl-modified backbones. The complexity of sequence space in such libraries reaches as high as a trillion (>1012, affording initial hits of high affinity ligands against protein targets. Although this article comprehensively covers several related technologies, we discuss in greater detail the technical development and advantages of the Random non-standard Peptide Integration Discovery (RaPID system, including the recent identification of inhibitors against various therapeutic targets.

  13. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  14. SECURING DIGITIZED LIBRARY CIRCULATORY SYSTEM

    African Journals Online (AJOL)

    user

    embedded PIC16F887 microcontroller to extract the tags unique identity. The RFID reader provides source of power for passive tags and is responsible for transmitting continuous signals at a frequency of 125 KHz, with the aid of its antenna receives and filters the signals, extracts the digital data from the processed signals ...

  15. Academic Library User Education in China.

    Science.gov (United States)

    Sun, Ping; Rader, Hannelore B.

    1999-01-01

    Discusses user education in China's academic libraries in light of educational reform and the changing role of academic libraries. Describes information technology developments, objectives of user education, and the emphasis on computerbased searching in the Tsinghua University library. (LRW)

  16. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    National Research Council Canada - National Science Library

    Kuhn, D

    2002-01-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication...

  17. Effect of crude oil and refined petroleum product imports on the national security. Critical technologies

    International Nuclear Information System (INIS)

    1989-01-01

    The report contains the results of an investigation requested under Section 232 of the Trade Expansion Act to study the effect of oil imports on the domestic petroleum industry and on United States energy security. It reviews previous energy security assessments and resulting initiatives, assesses current US energy security, and studies emergency petroleum requirements. The report finds that there have been substantial improvements in US energy security since the last Section 232 Petroleum finding in 1979. However, declining domestic oil production, rising oil imports, and growing dependence on potentially insecure sources of supply raise concerns of vulnerability to a major supply disruption

  18. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  19. SCHOOL COMMUNITY PERCEPTION OF LIBRARY APPS AGAINTS LIBRARY EMPOWERMENT

    Directory of Open Access Journals (Sweden)

    Achmad Riyadi Alberto

    2017-07-01

    Full Text Available Abstract. This research is motivated by the development of information and communication technology (ICT in the library world so rapidly that allows libraries in the present to develop its services into digital-based services. This study aims to find out the school community’s perception of library apps developed by Riche Cynthia Johan, Hana Silvana, and Holin Sulistyo and its influence on library empowerment at the library of SD Laboratorium Percontohan UPI Bandung. Library apps in this research belong to the context of m-libraries, which is a library that meets the needs of its users by using mobile platforms such as smartphones,computers, and other mobile devices. Empowerment of library is the utilization of all aspects of the implementation of libraries to the best in order to achieve the expected goals. An analysis of the schoolcommunity’s perception of library apps using the Technology Acceptance Model (TAM includes: ease of use, usefulness, usability, usage trends, and real-use conditions. While the empowerment of the library includes aspects: information empowerment, empowerment of learning resources, empowerment of human resources, empowerment of library facilities, and library promotion. The research method used in this research is descriptive method with quantitative approach. Population and sample in this research is school community at SD Laboratorium Percontohan UPI Bandung. Determination of sample criteria by using disproportionate stratified random sampling with the number of samples of 83 respondents. Data analysis using simple linear regression to measure the influence of school community perception about library apps to library empowerment. The result of data analysis shows that there is influence between school community perception about library apps to library empowerment at library of SD Laboratorium Percontohan UPI Bandung which is proved by library acceptance level and library empowerment improvement.

  20. Emerging information technologies in accounting and related security risks – what is the impact on the Romanian accounting profession

    Directory of Open Access Journals (Sweden)

    Sînziana-Maria Rîndașu

    2017-12-01

    Full Text Available This study investigates whether aspiring and professional accountants understand the benefits and security challenges brought by emerging technologies such as: Big Data, data analytics, cloud computing and mobile technologies. 115 participants took part in a survey during January and February 2017, all having at least one year of practical experience in accounting or audit and 80% of them being affiliated with national or international accounting professional bodies. The research has three key findings: (1 Professional accountants and auditors are having in average a theoretical knowledge of the emerging technologies in the accounting field, but they still need to enhance their skills to exploit them efficiently, (2 Mobile technologies started to be adopted by the Romanian practitioners and (3 The profession has become aware of the security risks brought by emerging technologies in the digital accounting. The accounting profession is on the verge of change and the practitioners do not yet possess sufficient skills regarding the analyzed emerging technologies. As per this, the professional bodies and academic environment should reassess their curricula to enforce the necessary changes for preparing practitioners to successfully face the future challenges and avoid their replacement by other professions more qualified.

  1. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  2. Supporting Case-Based Learning in Information Security with Web-Based Technology

    Science.gov (United States)

    He, Wu; Yuan, Xiaohong; Yang, Li

    2013-01-01

    Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…

  3. Teaching Information Security with Workflow Technology--A Case Study Approach

    Science.gov (United States)

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  4. Current State of Digital Reference in Primary and Secondary Education; The Technological Challenges of digital Reference; Question Negotiation and the Technological Environment; Evaluation of Chat Reference Service Quality; Visual Resource Reference: Collaboration between Digital Museums and Digital Libraries.

    Science.gov (United States)

    Lankes, R. David; Penka, Jeffrey T.; Janes, Joseph; Silverstein, Joanne; White, Marilyn Domas; Abels, Eileen G.; Kaske, Neal; Goodrum, Abby A.

    2003-01-01

    Includes five articles that discuss digital reference in elementary and secondary education; the need to understand the technological environment of digital reference; question negotiation in digital reference; a pilot study that evaluated chat reference service quality; and collaborative digital museum and digital library reference services. (LRW)

  5. AlGaInN laser diode technology for defence, security and sensing applications

    Science.gov (United States)

    Najda, Stephen P.; Perlin, Piotr; Suski, Tadek; Marona, Lucja; Boćkowski, Mike; Leszczyński, Mike; Wisniewski, Przemek; Czernecki, Robert; Kucharski, Robert; Targowski, Grzegorz; Watson, Scott; Kelly, Antony E.

    2014-10-01

    The latest developments in AlGaInN laser diode technology are reviewed for defence, security and sensing applications. The AlGaInN material system allows for laser diodes to be fabricated over a very wide range of wavelengths from u.v., i.e, 380nm, to the visible, i.e., 530nm, by tuning the indium content of the laser GaInN quantum well. Advantages of using Plasma assisted MBE (PAMBE) compared to more conventional MOCVD epitaxy to grow AlGaInN laser structures are highlighted. Ridge waveguide laser diode structures are fabricated to achieve single mode operation with optical powers of <100mW in the 400-420nm wavelength range that are suitable for telecom applications. Visible light communications at high frequency (up to 2.5 Gbit/s) using a directly modulated 422nm Gallium-nitride (GaN) blue laser diode is reported. High power operation of AlGaInN laser diodes is demonstrated with a single chip, AlGaInN laser diode `mini-array' with a common p-contact configuration at powers up to 2.5W cw at 410nm. Low defectivity and highly uniform GaN substrates allow arrays and bars of nitride lasers to be fabricated. GaN laser bars of up to 5mm with 20 emitters, mounted in a CS mount package, give optical powers up to 4W cw at ~410nm with a common contact configuration. An alternative package configuration for AlGaInN laser arrays allows for each individual laser to be individually addressable allowing complex free-space and/or fibre optic system integration within a very small form-factor.or.

  6. The secret to health information technology's success within the diabetes patient population: a comprehensive privacy and security framework.

    Science.gov (United States)

    Pandya, Sheel M

    2010-05-01

    Congress made an unprecedented investment in health information technology (IT) when it passed the American Recovery and Reinvestment Act in February 2009. Health IT provides enormous opportunities to improve health care quality, reduce costs, and engage patients in their own care. But the potential payoff for use of health IT for diabetes care is magnified given the prevalence, cost, and complexity of the disease. However, without proper privacy and security protections in place, diabetes patient data are at risk of misuse, and patient trust in the system is undermined. We need a comprehensive privacy and security framework that articulates clear parameters for access, use, and disclosure of diabetes patient data for all entities storing and exchanging electronic data. (c) 2010 Diabetes Technology Society.

  7. School and Library Media.

    Science.gov (United States)

    Fitzgerald, Mary Ann; Lance, Keith Curry; Everhart, Nancy; Toor, Ruth; Weisburg, Hilda K.; Small, Ruth V.; Ohrazda, Celestia; Revercomb, Pamela; Spector, J. Michael; Hughes-Hassell, Sandra; Mancall, Jacqueline C.; Reid, Sarah; Deglin, Sarena; Haynes, Elizabeth

    2003-01-01

    Contains six articles that cover topics related to instructional technology in school library media centers, including: impact on student achievement; data collection for program evaluation; integrating national and state standards; library media specialist collaboration with educational technologists; a professional development model; and online…

  8. Cutting the Army’s Umbilical Cord: A Study of Emerging Fuel Technologies and Their Impact on National Security

    Science.gov (United States)

    2011-12-01

    Cutting the Army’s Umbilical Cord A Study of Emerging Fuel Technologies and their Impact on National Security A Monograph by MAJ Matthew A...blank) 15 July 2011 SAMS Monograph, June 2010 - March 2011 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Cutting the Army’s Umbilical Cord A Study of...APPROVAL Major Matthew A. Price Title of Monograph: Cutting the Army’s Umbilical Cord Approved by: :r~z__J:W Bruce E. Stanley G. Scott Gorman, Ph

  9. Rebels in search of champions: Envisioning the library of the future

    Energy Technology Data Exchange (ETDEWEB)

    Moulik, A.; Lai, D.

    1991-06-21

    The traditional role of librarians to secure and provide access to the archives of recorded knowledge is being rapidly challenged on three fronts: the increasing technical sophistication of library users, the wide availability of information management software, and economic pressures on the growth of library collections. While we may argue endlessly about turf'' and ownership'', the real challenge is to forge a new ethic of librarianship which defies the stereotype of the passive provider of information services, explores new models of partnership with users, and champions an interactive environment in which to create the library of the future. The Main Library at Lawrence Livermore National Laboratory is actively engaged in testing experimental models of the library of the future, centered on dynamic user-librarian interactions, versatile information technologies, and on forecasting creative partnerships with library users in different environments. These experiments are described, evaluated, and their implications for future development are explored. 39 refs.

  10. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    Science.gov (United States)

    Kuhn, D. R.; Tracy, Miles C.; Frankel, Sheila E.

    2002-08-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication security and policy, security of home office systems, and considerations for system administrators in the central office. It addresses concepts relating to the selection, deployment, and management of broadband communications for a telecommuting user. This document is not intended to provide a mandatory framework for telecommuting or home office broadband communication environments, but rather to present suggested approaches to the topic.

  11. ISDL 2001: First DELOS International Summer School on Digital Library Technologies. Pisa, 9-13 luglio 2001

    OpenAIRE

    Ponzani, Vittorio

    2001-01-01

    In the last years the growth of systems and projects to create and develop digital libraries involves different field of the techical-scientific research: information retrieval, artificial intelligence, networks, information sciences, automated translation, documentantion, library science etc. The DELOS project was born with the Vth EC program, to make easier the comparison between the professionals acting in the information society (technicians, documentalists, librarians, archivists, museum...

  12. An Alternative Organizational Structure to Address the Technology Requirements in Health Science Library Information in the '80's

    Science.gov (United States)

    Winant, Richard M.

    1983-01-01

    Virginia Commonwealth University's University Library Services offers through its organizational structure an opportunity for librarians to work directly with media experts. University Library Services envisions the future librarian as an information manager, information specialist, and teacher. In joining together Technical Services, Public Services, Collection Management, Special Collections, Learning Resource Centers, Media Production Center, AV Services, TV Services, Engineering and Telecommunications, the librarian is in an environment which gives the opportunity for growth and support by media expertise.

  13. Hazardous materials safety and security technology field operational test. Volume II, evaluation final report synthesis

    Science.gov (United States)

    2004-11-11

    The catastrophic events of September 11, 2001 and the ongoing war on terrorism have heightened the level of concern from Federal government officials and the transportation industry regarding the secure transport of hazardous materials (HAZMAT). Secu...

  14. Report to Congress on innovative safety and security technology solutions for alternative transportation facilities

    Science.gov (United States)

    2017-05-01

    This research collected information on the frequency and impact of safety and security incidents (threats) at selected facilities and identified priority incidents at each facility. A customized all hazards approach was used to determine the ha...

  15. The impact of computerisation of library operations on library ...

    African Journals Online (AJOL)

    The use of computer-based systems in libraries and information units is now a vogue. The era of manual system in library operations is on its way to extinction. Recent developments in information world tend towards a globalized information communication technology (ICT). The library as a dynamic institution cannot afford ...

  16. Library of the Future: Croydon's New Central Library Complex.

    Science.gov (United States)

    Batt, Chris

    1993-01-01

    A new library and cultural center in Croyden (England) is described. Function-based areas include library, administration, technical services, museum and galleries, museum offices and store, cinema, tourist information center, and local government offices. Information technology systems include the library management system, office automation, and…

  17. Avionics Collaborative Engineering Technology Delivery Order 0035: Secure Knowledge Management (SKM) Technology Research Roadmap - Technology Trends for Collaborative Information and Knowledge Management Research

    National Research Council Canada - National Science Library

    Moody, Russell

    2004-01-01

    ...) this SKM Technology Research Roadmap. The SKM Technology Research Roadmap provides information on the current state, trends, gaps, land research challenges associated with SKM technology research...

  18. The Ten Commandments revisited: the Qualities of Good Library Space

    Directory of Open Access Journals (Sweden)

    Andrew McDonald

    2006-06-01

    Full Text Available An increasing diversity of imaginative new academic libraries are being constructed around the world, successfully combining exciting architectural expression, inspiring internal spaces and good functionality. Library managers must have a strong vision for the new library and this should inspire the design and the whole building process. This paper explores the key qualities of good learning space, whether in new or refurbished buildings. It is suggested that, ideally, learning space should be functional, adaptable, accessible, varied, interactive, conducive, environmentally suitable, safe and secure, efficient and suitable for information technology. New space should also have “oomph”, capturing the minds of users and the spirit of the university. These indicative issues should be discussed in the brief and throughout the planning process, and the priority given to them will depend on the mission and culture of the library. Greater attention is being given to daylight, natural ventilation, cultural artwork, noise management, security, disabled access, information skills training and provision for e-services. Planning is increasingly centred on people or the learner, emphasising the need for social, interactive and collaborative learning spaces as well as for traditional spaces for quiet study and reflection. Some libraries are joined-up with other services. The academic library is an enduring physical ‘place’, providing a blended, hybrid environment of traditional and electronic services crucial for the future of our universities and their communities.

  19. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  20. Microcomputers in the Anesthesia Library.

    Science.gov (United States)

    Wright, A. J.

    The combination of computer technology and library operation is helping to alleviate such library problems as escalating costs, increasing collection size, deteriorating materials, unwieldy arrangement schemes, poor subject control, and the acquisition and processing of large numbers of rarely used documents. Small special libraries such as…