WorldWideScience

Sample records for securing library technology

  1. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  2. The Security Research of Digital Library Network

    Science.gov (United States)

    Zhang, Xin; Song, Ding-Li; Yan, Shu

    Digital library is a self-development needs for the modern library to meet the development requirements of the times, changing the way services and so on. digital library from the hardware, technology, management and other aspects to objective analysis of the factors of threats to digital library network security. We should face up the problems of digital library network security: digital library network hardware are "not hard", the technology of digital library is relatively lag, digital library management system is imperfect and other problems; the government should take active measures to ensure that the library funding, to enhance the level of network hardware, to upgrade LAN and prevention technology, to improve network control technology, network monitoring technology; to strengthen safety management concepts, to prefect the safety management system; and to improve the level of security management modernization for digital library.

  3. Mobile technologies for every library

    CERN Document Server

    Gleason, Ann Whitney

    2015-01-01

    If you are wondering what mobile technology adoption means for your library or how to get started, Mobile Technologies for Every Library will answer your questions! This book will detail the opportunities and pitfalls in using mobile technology in libraries. It will also address platforms, options, security, and best practices for starting new mobile services programs or improving existing services. Gleason previews many useful apps for libraries. Web links and resources are also included.

  4. SECURING DIGITIZED LIBRARY CIRCULATORY SYSTEM

    African Journals Online (AJOL)

    user

    The widespread application of the developed system on smart library circulation .... database management system; [9] through securing .... system running on a Windows 8 Operating system .... mini library for their support, advice and unlimited.

  5. Gender, Technology, and Libraries

    Directory of Open Access Journals (Sweden)

    Melissa Lamont

    2009-09-01

    Full Text Available Information technology (IT is vitally important to many organizations, including libraries. Yet a review of employment statistics and a citation analysis show that men make up the majority of the IT workforce, in libraries and in the broader workforce. Research from sociology, psychology, and women’s studies highlights the organizational and social issues that inhibit women. Understanding why women are less evident in library IT positions will help inform measures to remedy the gender disparity.

  6. How Much Security Does Your Library Need?

    Science.gov (United States)

    Banerjee, Kyle

    2003-01-01

    Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…

  7. Science & Technology Digital Library

    OpenAIRE

    Solodovnik, Iryna

    2014-01-01

    This document contains information on the activities carried out within the project Science & Technology Digital Library and in particular, it describes the Metadata Core Reference Model. Metadata are strategic for semantic interoperability to and, from the repository. Metadata are essential for available and safe management of digital objects, and for their sustainability and preservation. For these reasons, the project needs to define a specific metadata model. The purpose of this document ...

  8. SECURING DIGITIZED LIBRARY CIRCULATORY SYSTEM | Olaniyi ...

    African Journals Online (AJOL)

    Journal Home > Vol 35, No 3 (2016) > ... Despite the potential benefits of Information and Communication Technology (ICT) in library automation, ... The widespread application of the developed system on smart library circulation unit would ...

  9. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  10. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  11. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  12. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  13. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  14. Security Risks Management in Selected Academic Libraries in Osun ...

    African Journals Online (AJOL)

    The survival of a library depends to a large extent on how secured its collections are. Security of collections constitutes a critical challenge facing academic libraries in Nigeria. It is against this background that this study investigated the security risks management in selected academic libraries in Osun State, Nigeria.

  15. Optimizing use of library technology.

    Science.gov (United States)

    Wink, Diane M; Killingsworth, Elizabeth K

    2011-01-01

    In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes optimizing the use of library technology.

  16. Security issues and service provision in Laz Otti Memorial Library ...

    African Journals Online (AJOL)

    Lagos Journal of Library and Information Science ... Data was analysed with the aid of Statistical Package for Social Sciences (SPSS. ... To curb this menace, library management must educate users on use of library resources ... Keywords: Library security, Theft, Mutilation, Vandalism, Library resources; Laz Otti Memorial ...

  17. Fiber Optics and Library Technology.

    Science.gov (United States)

    Koenig, Michael

    1984-01-01

    This article examines fiber optic technology, explains some of the key terminology, and speculates about the way fiber optics will change our world. Applications of fiber optics to library systems in three major areas--linkage of a number of mainframe computers, local area networks, and main trunk communications--are highlighted. (EJS)

  18. Libraries Achieving Greatness: Technology at the Helm

    Science.gov (United States)

    Muir, Scott P.

    2009-01-01

    Libraries have been around for thousands of years. Many of them are considered great because of their magnificent architecture or because of the size of their collections. This paper offers ten case studies of libraries that have used technology to achieve greatness. Because almost any library can implement technology, a library does not have to…

  19. Security and Crime Challenges in Academic Libraries in Nigeria

    African Journals Online (AJOL)

    Security and prevention of crimes in academic libraries is essential library duties .... From the earliest time to the present, librarians are bothered on how to ensure the protection ..... OPAC (Online Public Access Catalogue) computer system etc.

  20. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  1. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  2. McDonald and Company Securities Library User Survey, 1996.

    Science.gov (United States)

    Wolfgram, Derek E.

    The library of McDonald and Company Securities is important to the success of the business and its employees. This study assesses the needs and expectations of the library users, and analyzes how well the current library services are meeting those needs and expectations. A questionnaire was distributed to a large random sample of the firm's…

  3. Handheld Libraries 101: Using Mobile Technologies in the Academic Library

    Science.gov (United States)

    Kosturski, Kate; Skornia, Frank

    2011-01-01

    The 2009 "Horizon Report" called mobile technologies "an opportunity for higher education to reach its constituents in new and compelling ways." The report implied that academic libraries would find them to be the ideal tools for bringing reluctant researchers to the library, mainly for their convenience. It's not hard to see why--in 2008, mobile…

  4. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  5. Library security better communication, safer facilities

    CERN Document Server

    Albrecht, Steve

    2015-01-01

    Through the methods outlined in this book, Albrecht demonstrates that effective communication not only makes library users feel more comfortable but also increases staff morale, ensuring the library is place where everyone feels welcome.

  6. Information Technology in Libraries. A Pakistani Perspective.

    Science.gov (United States)

    Mahmood, Khalid

    This book presents an overview of the present status of the use of library automation hardware and software in Pakistan. The following 20 articles are included: (1) "The Status of Library Automation in Pakistan"; (2) "Promoting Information Technology in Pakistan: the Netherlands Library Development Project"; (3) "Library…

  7. Information security foundations, technologies and applications

    CERN Document Server

    Awad, Ali Ismail; Fairhurst, Michael

    2018-01-01

    This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

  8. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  9. School Library Supplement. Putting Your Library Automation System to Work [and] Using Videodiscs in Research Projects [and] Library Security: What to Look For [and] Expanding Library/Media Services with Media Retrieval [and] How to Network CD-ROMs (and) The School Library Resource Directory.

    Science.gov (United States)

    Karpisek, Marian; And Others

    1995-01-01

    Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…

  10. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  11. Educational Technologies in Health Science Libraries: Teaching Technology Skills

    Science.gov (United States)

    Hurst, Emily J.

    2014-01-01

    As technology rapidly changes, libraries remain go-to points for education and technology skill development. In academic health sciences libraries, trends suggest librarians provide more training on technology topics than ever before. While education and training have always been roles for librarians, providing technology training on new mobile devices and emerging systems requires class creation and training capabilities that are new to many. To appeal to their users, many health sciences librarians are interested in developing technology-based classes. This column explores the question: what skills are necessary for developing and teaching technology in an academic health sciences library setting? PMID:24528269

  12. Educational technologies in health sciences libraries: teaching technology skills.

    Science.gov (United States)

    Hurst, Emily J

    2014-01-01

    As technology rapidly changes, libraries remain go-to points for education and technology skill development. In academic health sciences libraries, trends suggest librarians provide more training on technology topics than ever before. While education and training have always been roles for librarians, providing technology training on new mobile devices and emerging systems requires class creation and training capabilities that are new to many librarians. To appeal to their users, many health sciences librarians are interested in developing technology-based classes. This column explores the question: what skills are necessary for developing and teaching technology in an academic health sciences library setting?

  13. Helping the Hacker? Library Information, Security, and Social Engineering

    Directory of Open Access Journals (Sweden)

    Samuel T. C. Thompson

    2006-12-01

    Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.

  14. Libraries, Self-Censorship, and Information Technologies.

    Science.gov (United States)

    Buschman, John

    1994-01-01

    Explores the theme of self-censorship in libraries in relation to new technologies. Highlights include the results of investing in high-cost electronic resources at the expense of traditional, lower-status formats; the effect of information technologies on literacy and historical records; and market censorship, including centralization and…

  15. Towards improving security measures in Nigeria University Libraries ...

    African Journals Online (AJOL)

    A questionnaire designed by the researchers titled “Towards Improving Security Measures in Nigerian University Libraries (TISMINUL)” was used to collect the needed data. The questionnaire was designed in two parts. Part one was to gather information on the size of collection, frequency of stock taking and book loss.

  16. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... Security, consistent with Federal policies for the security of unclassified information and information... Certification Program, and provide a Web site link within a contract clause to a library where contractors can... Security should be addressed through government-wide policies, standards, and requirements. NASA response...

  17. Security Problems of Mobile Technologies

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The article provides an overview of security problems which exist in the mobile devices. The main technologies aimed to protect the phones from various types of attacks are considered. The authors justify the necessity of developing new improved tools and methods to ensure the safety of such devices.

  18. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  19. Public libraries, information society and technology: communication

    Directory of Open Access Journals (Sweden)

    Elsa Barber

    2001-01-01

    Full Text Available The research team focuses in the influence that Argentinian public libraries (popular and public have with library automation and public services oriented to the use of information technologies, and the acquisition of communitarian information skills within the information society. The methodology consists of a survey already successfully approved in previous investigations by the research team (UBACYT FI013 and TF06. The questionnaire focuses on related variables. On one hand, the variables were related to libraries automation processes (equipment, information systems,working modules, retrospective conversion, digitization, networks,and so on. And on the other hand, with given information technologies services (access to networks and documents in every media, Web navigation assistance, information technology local server, services to minorities, and so on. Data would be gathered with specific applications from the social sciences field. The final stage would be to study specific aspects of the automation processes of the libraries surveyed, in order to verify the reciprocal relationship between the automation level reached. And subsequently, to examine the likelihood of establishing new services that respond to the community information trends within the information technology and telecommunications development context.

  20. Exploring Information Security and Shared Encrypted Spaces in Libraries

    Directory of Open Access Journals (Sweden)

    Keith Engwall

    2015-07-01

    Full Text Available Libraries are sensitive to the need to protect patron data, but may not take measures to protect the data of the library. However, in an increasingly collaborative online environment, the protection of data is a concern that merits attention. As a follow-up to a new patron privacy policy, the Oakland University William Beaumont Medical Library evaluated information security tools for use in day-to-day operations in an attempt to identify ways to protect private information in communication and shared storage, as well as a means to manage passwords in a collaborative team environment. This article provides an overview of encryption measures, outlines the Medical Library’s evaluation of encryption tools, and reflects on the benefits and challenges in their adoption and use.

  1. Adaptive technologies for library and information services for ...

    African Journals Online (AJOL)

    Adaptive technologies for library and information services for physically challenged in special education schools of Kaduna State. ... special education schools because; these are genuine demand from adaptive technology users of the library.

  2. Effect of Technology on Librarians in Academic Libraries in Nigeria ...

    African Journals Online (AJOL)

    Keywords: techno stress, librarians, technology, perceptions, Nigeria ... Librarians in academic libraries work in an ever changing technological ... world. It is thus paramount for university libraries to address associated issues related to the use.

  3. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  4. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  5. The National Resource Library for Science and Technology in Sweden: A Nordic model of cooperating technology libraries

    Science.gov (United States)

    Lagar, Gunnar

    1994-01-01

    The scope of this presentation is to give a state-of-the-art report on the present situation of Nordic technology libraries, to elaborate on a plan for national resource libraries in Sweden, and to share how the Royal Institute of Technology Library in Stockholm (KTHB) has fostered a network of cooperating libraries in order to optimize government funding for the system of resource libraries.

  6. The Adoption of Cloud Computing Technology for Library Services ...

    African Journals Online (AJOL)

    The study investigated the rationales for the adoption of cloud computing technology for library services in NOUN Library. Issues related to the existing computer network available in NOUN library such as LAN, WAN, rationales for the adoption of cloud computing in NOUN library such as the need to disclose their collections ...

  7. Computer and Network Security in Small Libraries: A Guide for Planning.

    Science.gov (United States)

    Williams, Robert L.

    This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…

  8. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  9. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  10. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    Science.gov (United States)

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  11. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  12. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  13. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  14. School Library Media Specialists Inform Technology Preparation of Library Science Students: An Evidence-Based Discussion

    Science.gov (United States)

    Snyder, Donna L.; Miller, Andrea L.

    2009-01-01

    What is the relative importance of current and emerging technologies in school library media programs? In order to answer this question, in Fall 2007 the authors administered a survey to 1,053 school library media specialists (SLMSs) throughout the state of Pennsylvania. As a part of the MSLS degree with Library Science K-12 certification, Clarion…

  15. Mobile technology for expansion of service range medan public library

    Science.gov (United States)

    Siregar, A. R.; Dewiyana, H.

    2018-03-01

    The information society, especially library users, expects an easier and faster way to get information and share knowledge. The library also implements the best way to provide the best service and the easiest way to disseminate and share information with its users. One technology that allows libraries more closely with their users is mobile technology. This paper aims to determine the basic conditions of mobile technology services and mobile services most needed library users, as well as constraints faced by libraries and users in the application of mobile technology. This paper will help libraries to develop better M-Library services in expanding the reach of library services. Methods of data collection were conducted through surveys through questionnaires, interviews, and direct observation. The results of the use of mobile technology applications in libraries bring great advantages to provide better library services and to improve accessibility of library resources in the easiest way, but due to lack of funds, lack of skills and lack of staff, many libraries are unable to provide this service with very successful.

  16. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  17. Discussion on AI Technology in Information Library Design

    OpenAIRE

    日比野, 省三; Shozo, HIBINO; 中京大学社会学部

    1987-01-01

    This paper deals with the discussion on the importance of AI (Artificial Intelligence) Technology in planning and designing a library information system in the near future. First of all, the history of Library and Information Science is reviewed and it is identified that the key technology in the future library will be AI as a mega-trend. After reviewing the concepts of AI technology, a model of a Knowledge-Base system is discussed as a case study, using micro-PROLOG.

  18. Marine data security based on blockchain technology

    Science.gov (United States)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  19. RFID Technology Implementation in Two Libraries in New Delhi

    Science.gov (United States)

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  20. A History of the Utilization of Technology in Academic Libraries.

    Science.gov (United States)

    Boden, Dana W. R.

    This paper examines the history of academic libraries with special emphasis on the beginnings, growth, and progress in the uses of technology in those libraries. The earliest libraries were maintained for the preservation of knowledge and information. Access to the items in these collections was limited. With the growth of higher education in the…

  1. Multimedia technologies in university libraries: opportunities and tasks

    Directory of Open Access Journals (Sweden)

    Tavalbekh Serkhan Ali

    2010-03-01

    Full Text Available Multimedia technologies (MMT are considered as a factor of qualitative changes of informational environment of education. Leading role of libraries in the process of integration of MMT environment of university is determined. Influence of libraries experience in usage of informational technologies both traditional and computer-aided, Internet in particular is observed. Determined that introduction of MMT noticeable improving the importance of library in MMT environment organization of universities, improvement of library informational service. Tasks of university libraries with integration into united media space are defining.

  2. Shock wave science and technology reference library

    CERN Document Server

    2009-01-01

    This book, as a volume of the Shock Wave Science and Technology Reference Library, is primarily concerned with detonation waves or compression shock waves in reactive heterogeneous media, including mixtures of solid, liquid and gas phases. The topics involve a variety of energy release and control processes in such media - a contemporary research field that has found wide applications in propulsion and power, hazard prevention as well as military engineering. The six extensive chapters contained in this volume are: - Spray Detonation (SB Murray and PA Thibault) - Detonation of Gas-Particle Flow (F Zhang) - Slurry Detonation (DL Frost and F Zhang) - Detonation of Metalized Composite Explosives (MF Gogulya and MA Brazhnikov) - Shock-Induced Solid-Solid Reactions and Detonations (YA Gordopolov, SS Batsanov, and VS Trofimov) - Shock Ignition of Particles (SM Frolov and AV Fedorov) Each chapter is self-contained and can be read independently of the others, though, they are thematically interrelated. They offer a t...

  3. Shock wave science and technology reference library

    CERN Document Server

    2009-01-01

    This book is the second of several volumes on solids in the Shock Wave Science and Technology Reference Library. These volumes are primarily concerned with high-pressure shock waves in solid media, including detonation and high-velocity impact and penetration events. Of the four extensive chapters in this volume, the first two describe the reactive behavior of condensed phase explosives, - Condensed-Phase Explosives: Shock Initiation and Detonation Phenomena (SA Sheffield and R Engelke) - First Principles Molecular Simulations of Energetic Materials at High-Pressures (F Zhang, S Alavi, and TK Woo), and the remaining two discuss the inert, mechanical response of solid materials. - Combined Compression and Shear Plane Waves (ZP Tang and JB Aidun), and - Dynamic Fragmentation of Solids (D Grady). All chapters are each self-contained, and can be read independently of each other. They offer a timely reference, for beginners as well as professional scientists and engineers, on the foundations of detonation phenomen...

  4. Shock Waves Science and Technology Library

    CERN Document Server

    2012-01-01

    This book, as a volume of the Shock Wave Science and Technology Reference Library, is primarily concerned with the fundamental theory of detonation physics in gaseous and condensed phase reactive media. The detonation process involves complex chemical reaction and fluid dynamics, accompanied by intricate effects of heat, light, electricity and magnetism - a contemporary research field that has found wide applications in propulsion and power, hazard prevention as well as military engineering. The seven extensive chapters contained in this volume are: - Chemical Equilibrium Detonation (S. Bastea and LE Fried) - Steady One-Dimensional Detonations (A Higgins) - Detonation Instability (HD Ng and F Zhang) - Dynamic Parameters of Detonation (AA Vasiliev) - Multi-Scaled Cellular Detonation (D Desbordes and HN Presles) - Condensed Matter Detonation: Theory and Practice (C Tarver) - Theory of Detonation Shock Dynamics (JB Bdzil and DS Stewart) The chapters are thematically interrelated in a systematic descriptive appro...

  5. IFLA General Conference, 1986. Special Libraries Division. Section: Science and Technology Libraries. Papers.

    Science.gov (United States)

    International Federation of Library Associations and Institutions, The Hague (Netherlands).

    Papers on science and technology libraries which were presented at the 1986 International Federation of Library Associations (IFLA) conference include: (1) "Online Information Service of the Japan Information Center of Science and Technology" (Ryuko Igarashi, Japan); (2) "A View from the Chip--The Influence of Information…

  6. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  7. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  8. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  9. Fundamentals of Library Automation and Technology. Participant Workbook.

    Science.gov (United States)

    Bridge, Frank; Walton, Robert

    This workbook presents outlines of topics to be covered during a two-day workshop on the fundamentals for library automation. Topics for the first day include: (1) Introduction; (2) Computer Technology--A Historical Overview; (3) Evolution of Library Automation; (4) Computer Hardware Technology--An Introduction; (5) Computer Software…

  10. Current Technology Trends for School Library Media Specialists

    OpenAIRE

    Leticia Ekhaml; Joan Hubbard

    2003-01-01

    An overview of some of the current technology trends used in classroom instruction and school library media centers in provided in this article such as the use of handheld electronic organizers, CD recorders, digital video cameras, and interactive whiteboards. The article offers some suggestions or ideas on how to acquire new technologies to school library media centers that are low in budgetary funds.

  11. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  12. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  13. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  14. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  15. Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures

    Science.gov (United States)

    Balas, Janet

    2005-01-01

    This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…

  16. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  17. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  18. Management of library and archival security from the outside looking in

    CERN Document Server

    O'Neill, Robert K

    2014-01-01

    Providing a substantive approach to the issue, Management of Library and Archival Security: From the Outside Looking In gives librarians and collection directors practical and helpful suggestions for developing policies and procedures to minimize theft. In addition, this text prepares you to deal with the aftermath of a robbery or natural disaster that destroys priceless materials. Through expert opinions and advice, Management of Library and Archival Security will teach you how to protect and secure invaluable collections and the finances invested in them.In addition, Management of Library an

  19. IFLA General Conference, 1985. Division on Special Libraries. Section on Science and Technology Libraries. Papers.

    Science.gov (United States)

    International Federation of Library Associations, The Hague (Netherlands).

    Papers on science and technology libraries which were presented at the 1985 International Federation of Library Associations (IFLA) conference include: (1) "UAP (Universal Availability of Publications) and User Training for Categories of Grey Literature" (Dieter Schmidmaier, Mining Academy Freiberg, East Germany); (2) "Resource…

  20. Application of LOD Technology in German Libraries and Archives

    Directory of Open Access Journals (Sweden)

    Dong Jie

    2017-12-01

    Full Text Available [Purpose/significance] Linked Open Data (LOD has been widely used in large industries, as well as non-profit organizations and government organizations. Libraries and archives are ones of the early adopters of LOD technology. Libraries and archives promote the development of LOD. Germany is one of the developed countries in the libraries and archives industry, and there are many successful cases about the application of LOD in the libraries and archives. [Method/process] This paper analyzed the successful application of LOD technology in German libraries and archives by using the methods of document investigation, network survey and content analysis. [Result/conclusion] These cases reveal in the traditional field of computer science the relationship among research topics related to libraries and archives such as artificial intelligence, database and knowledge discovery. Summing up the characteristics and experience of German practice can provide more reference value for the development of relevant practice in China.

  1. Web 2.0 and libraries impacts, technologies and trends

    CERN Document Server

    Parkes, Dave

    2010-01-01

    In a world where computing power, ubiquity and connectivity create powerful new ways to facilitate learning, this book examines how librarians and information professionals can utilize emerging technologies to expand service and resource delivery. With contributions from leading professionals, including lecturers, librarians and e-learning technologists, this bookl explores strategic approaches for effectively implementing, living with, and managing revolutionary technological change in libraries.Explores the impact of the social and technological aspects of Web 2.0 on librarie

  2. Implications of Information Technology on the Training of Library ...

    African Journals Online (AJOL)

    Furthermore, training is offered through various modes such as contact (full-time or part-time) ... theoretical background, good interpersonal and teamwork skills, the ability to .... LS 212 Literature and Library Service to Children & Adolescents .... Technology and customer expectation in academic libraries: a special reference.

  3. Effect of technology on librarians in academic libraries in Nigeria ...

    African Journals Online (AJOL)

    The purpose of this study is to investigate the effect of technology on librarians working in academic libraries in Nigeria with particular reference to Delta State. The descriptive survey design was adopted. The twelve (12) tertiary institutions libraries in Delta State were used for the study. The purposive sampling technique ...

  4. Factors Underlying Technology Adoption in Academic Libraries in Kuwait

    Science.gov (United States)

    Al-Fadhli, Meshal; Corrall, Sheila; Cox, Andrew

    2016-01-01

    The study analyzed factors shaping adoption of technology in academic libraries in Kuwait. The research was based on interviews conducted with library directors, staff, and users, combined with observation and document analysis. A major aspect of the Kuwaiti context was a relative lack of financial restraints and an enthusiasm for technology…

  5. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    Science.gov (United States)

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  6. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  7. Infrared: A Key Technology for Security Systems

    OpenAIRE

    Corsi, Carlo

    2012-01-01

    Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due...

  8. Report on International Roundtable Meeting on Collection Security held at the British Library

    OpenAIRE

    Andy Stephens; Helen Shenton

    2008-01-01

    Anonymised report on some of the issues raised at an international roundtable on collection security of thirteen major research libraries and national libraries from Europe and North America. Recurring themes of case studies included: 1) perpetrator profiling; 2) relations with the criminal justice system; 3) systems; 4) looking out; 5) aftermath.

  9. Report on International Roundtable Meeting on Collection Security held at the British Library

    Directory of Open Access Journals (Sweden)

    Andy Stephens

    2008-09-01

    Full Text Available Anonymised report on some of the issues raised at an international roundtable on collection security of thirteen major research libraries and national libraries from Europe and North America. Recurring themes of case studies included: 1 perpetrator profiling; 2 relations with the criminal justice system; 3 systems; 4 looking out; 5 aftermath.

  10. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  11. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  12. Application on Internet of Things Technology Using in Library Management

    Science.gov (United States)

    Liu, Xueqing; Sheng, Wenwen

    Following the computer, Internet and mobile communication network, the Internet of Things (IOT) will bring a new development of information industry, and moreover is a global technology revolution that is bound to have a profound impact on the economic development and social life. This paper analyzes the key technology and working principle of IOT, its development at home and abroad, its application in the library management, and proposes its development direction in the field of library management and promotion programs.

  13. Management and innovation of small science and technology libraries

    International Nuclear Information System (INIS)

    Yang Shumei

    2014-01-01

    This paper describes the new conception of management and service of small science and technology libraries in research and development institutions (R and D institutions), in the light of characteristics of the R and D institution, this paper gives the small science and technology libraries the new and advanced knowledge of management and service. Moreover, this paper gives instructions on knowledge management and service innovation in future practice. (author)

  14. Current Technology Trends for School Library Media Specialists

    Directory of Open Access Journals (Sweden)

    Leticia Ekhaml

    2003-03-01

    Full Text Available An overview of some of the current technology trends used in classroom instruction and school library media centers in provided in this article such as the use of handheld electronic organizers, CD recorders, digital video cameras, and interactive whiteboards. The article offers some suggestions or ideas on how to acquire new technologies to school library media centers that are low in budgetary funds.

  15. Transforming Knowledge Creation: An Action Framework for Library Technology Diversity

    Directory of Open Access Journals (Sweden)

    Barbara I. Dewey

    2015-04-01

    Full Text Available This paper will articulate an action framework for library technology diversity consisting of five dimensions and based on the vision for knowledge creation, the academic library’s fundamental vision. The framework focuses on increasing diversity for library technology efforts based on the desire for transformation and inclusiveness within and across the dimensions. The dimensions are people, content and pedagogy, embeddedness and the global perspective, leadership, and the 5th dimension – bringing it all together.

  16. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  17. Growing a Technology Equipment Service in an Academic Library

    Science.gov (United States)

    Anderson, Sean; Weatherbee, Sue

    2012-01-01

    The 21st-century student is highly technological. In order to encourage and enable the technologically advanced students, the authors wanted to develop a technology equipment service in the library at Texas A&M University-Commerce. They had an idea of what they wanted to accomplish but were unsure of how to get started. They started a small…

  18. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  19. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    Science.gov (United States)

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  20. Tracing technology in the Association of Academic Health Sciences Libraries.

    Science.gov (United States)

    Guard, J Roger; Peay, Wayne J

    2003-04-01

    From the beginning of the association, technology and the Association of Academic Health Sciences Libraries (AAHSL) have been intertwined. Technology was the focus of one of the first committees. Innovative applications of technology have been employed in the operations of the association. Early applications of mini-computers were used in preparing the Annual Statistics. The association's use of network communications was among the first in the country and later applications of the Web have enhanced association services. For its members, technology has transformed libraries. The association's support of the early development of Integrated Advanced Information Management Systems (IAIMS) and of its recent reconceptualization has contributed to the intellectual foundation for this revolution.

  1. Modern Quantum Technologies of Information Security

    OpenAIRE

    Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy

    2010-01-01

    In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is consider...

  2. Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask

    Directory of Open Access Journals (Sweden)

    Alex Caro

    2016-04-01

    Full Text Available This article is based on an independent cyber security risk management audit for a public library system completed by the authors in early 2015 and based on a research paper by the same group at Clark University in 2014. We stress that while cyber security must include raising public knowledge in regard to cyber security issues and resources, and libraries are indeed the perfect place to disseminate this knowledge, librarians are also in a unique position as the gatekeepers of information services provided to the public and should conduct internal audits to ensure our content partners and IT vendors take cyber security as seriously as the library and its staff. One way to do this is through periodic reviews of existing vendor relationships. To this end, the authors created a simple grading rubric you can adopt or modify to help take this first step towards securing your library data. It is intended to be used by both technical and non-technical staff as a simple measurement of what vendor agreements currently exist and how they rank, while at the same time providing a roadmap for which security features or policy statements the library can or should require moving forward.

  3. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  4. Pop-up Library Makerspace: academic libraries provide flexible, supportive space to explore emerging technologies.

    OpenAIRE

    Groves, Antony

    2016-01-01

    The word Makerspace is a general term for a place where people get together to make things, create things and\\ud learn together. Antony Groves presents a look at a recent university library experiment hosting a pop-up makerspace. Working with local edtech leaders MakerClub and colleagues the library organised a two-hour workshop which offered the opportunity for students and staff to explore emerging technologies.

  5. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  6. Security of Heterogeneous Content in Cloud Based Library Information Systems Using an Ontology Based Approach

    Directory of Open Access Journals (Sweden)

    Mihai DOINEA

    2014-01-01

    Full Text Available As in any domain that involves the use of software, the library information systems take advantages of cloud computing. The paper highlights the main aspect of cloud based systems, describing some public solutions provided by the most important players on the market. Topics related to content security in cloud based services are tackled in order to emphasize the requirements that must be met by these types of systems. A cloud based implementation of an Information Library System is presented and some adjacent tools that are used together with it to provide digital content and metadata links are described. In a cloud based Information Library System security is approached by means of ontologies. Aspects such as content security in terms of digital rights are presented and a methodology for security optimization is proposed.

  7. Wearable technology smart watches to Google Glass for libraries

    CERN Document Server

    Bruno, Tom

    2015-01-01

    Emerging devices are placing powerful computing abilities into the wardrobes of consumers through wearable technology which combines fashion and function in new and exciting ways. The most recognizable of these emerging gadgets is Google Glass. Wearable Technology: Smart Watches to Google Glass for Libraries provides a comprehensive overview of the current wearable technology landscape, the types of devices and functionality available, the benefits and limitations of this type of technology, and how you can make use of it in yo

  8. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  9. Proceedings of a Conference on Telecommunication Technologies, Networkings and Libraries

    Science.gov (United States)

    Knight, N. K.

    1981-12-01

    Current and developing technologies for digital transmission of image data likely to have an impact on the operations of libraries and information centers or provide support for information networking are reviewed. Technologies reviewed include slow scan television, teleconferencing, and videodisc technology and standards development for computer network interconnection through hardware and software, particularly packet switched networks computer network protocols for library and information service applications, the structure of a national bibliographic telecommunications network; and the major policy issues involved in the regulation or deregulation of the common communications carriers industry.

  10. Use of assistive technologies in academic libraries: a survey.

    Science.gov (United States)

    Tripathi, Manorama; Shukla, Archana

    2014-01-01

    The present article attempts to highlight the use of assistive technologies in academic libraries in India, the United Kingdom, the United States, and Canada. It dwells upon the use and importance of assistive technologies in general and their use for visually challenged learners in particular. Further, it gives suggestions for implementing assistive technologies in academic libraries for making visually challenged students self-reliant learners in accomplishing their academic and research pursuits. The present study adopted convenience sampling for collecting the data, which was collected between December 15, 2012 and January 18, 2013.

  11. Library macro-environment: New technological and economic rules

    Directory of Open Access Journals (Sweden)

    Karmen Štular-Sotošek

    2003-01-01

    Full Text Available Fast and flexible adaptation to changes in the macro-environment is also crucial for libraries, which have to review them, respond to them and become a part of them. Consequently, the application of marketing science and tools helps libraries to find out how to survive in the competitive world and how to become better and stronger. The article, which draws from marketing, economic and information disciplines, introduces the main principles in the technological and economic environment of libraries and finds the knowledge about these disciplines to be most crucial for successful management of modern libraries, especially on the pretentious publishing market and on the market of information suppliers. Within the technological and economic environment, the cooperation is the only logical solution, which benefits the producers of information services and products as well as libraries. The following text finds that libraries will achieve long-term success and will be proactive in developing partnerships only by using relationship marketing. This relatively new approach offers libraries new ways for successful and long-term management of alliances between partners.

  12. Energy technology evaluation report: Energy security

    Science.gov (United States)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  13. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  14. Safeguarding cultural properties security for museums, libraries, parks, and zoos

    CERN Document Server

    Layne, Stevan P

    2014-01-01

    Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic s

  15. Interactions between libraries and technology over the past 30 years

    DEFF Research Database (Denmark)

    Greifeneder, Elke; Seadle, Michael; Lynch, Clifford

    2012-01-01

    Purpose – The purpose of this paper is to look back on the last 30 years of technology development for libraries. Design/methodology/approach – The paper presents an interview that took place at the American Library Association Annual Meeting in Anaheim, California. Findings – The paper reveals...... that many of the developments are slow. There are very few really sudden revolutions in social-scale technologies. They do not switch on quickly and cannot be sudden because the installed base is too thin. Originality/value – The paper reveals that there should be some renewed conversation about how...

  16. Resource sharing in libraries concepts, products, technologies, and trends

    CERN Document Server

    Breeding, Marshall

    2014-01-01

    Supplementing your local collection through resource sharing is a smart way to ensure your library has the resources to satisfy the needs of your users. Marshall Breeding's new Library Technology Report explores technologies and strategies for sharing resources, helping you streamline workflows and improve resource-sharing services by covering key strategies like interlibrary loan, consortial borrowing, document delivery, and shared collections. You'll also learn about such trends and services as:OCLC WorldCat Resource Sharing, and other systems that facilitate cooperative, reciprocal lendingS

  17. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  18. Female Public Library Patrons Value the Library for Services, Programs, and Technology. A Review of: Fidishun, Dolores. “Women and the Public Library: Using Technology, Using the Library.” Library Trends 56.2 (2007: 328-43.

    Directory of Open Access Journals (Sweden)

    Virginia Wilson

    2009-03-01

    Full Text Available Objective – This study attempts to give insight into why and how women use the public library and information technology, and how they learned to use the technology.Design – Qualitative survey.Setting – The research took place at the Chester County Library in Exton, Pennsylvania, USA.Subjects – One hundred and eighty-four female library patrons 18 years and older.Methods – An anonymous qualitative survey was handed out to all patrons at the ChesterCounty Library 18 years of age and older who came into the library on four separate days and times. Times were chosen to obtain a good representation of library patrons, and included daytime, evening, and weekend hours. The survey consisted of questions about library use, information sought, information seeking behaviour, technology used, and how the respondents learned to use the technology. The surveys were collated and spreadsheets were created that reported answers to yes/no and other data questions. Word documents facilitated the listing of more qualitative answers. The data were analyzed using a thematic content analysis to find themes and patterns that emerged to create grounded theory. In thematic content analysis, “the coding scheme is based on categories designed to capture the dominant themes in a text (Franzosi 184. There is no universal coding scheme, and this method requires extensive pre-testing of the scheme (Franzosi 184. Grounded theory “uses a prescribed set of procedures for analyzing data and constructing a theoretical model” from the data (Leedy and Ormrod 154.Main Results – The survey asked questions about library use, reasons for library use, using technology, finding information, and learning to use online resources. A total of 465 surveys were distributed and 329 were returned. From the surveys returned, 184 were from female patrons, 127 from male patrons, and 18 did not report gender. The data for this article are primarily taken from the 184 female

  19. International Association of Technological University Libraries (IATUL: Promoting Science and Technology Librarianship in the Changing Library Landscape

    Directory of Open Access Journals (Sweden)

    Maitrayee Ghosh

    2013-11-01

    Full Text Available International Association of Technological University Libraries (IATUL has been in the forefront of providing leadership to information professionals and promoting science and Technology librarianship in today's changing library landscape. The present article is an attempt to comprehend the present status of IATUL and analyze the activities and contribution it has made to overcome the range of challenges facing by tertiary level Technological libraries throughout the world. The SWOT analysis method is used to assess the achievements of IATUL, failures and ascertain constraints being faced in this internet age. The author relied on web sites as well as ephemeral material such as minutes, annu- al reports, newsletters, and memoranda to construct this article. Meeting and Interview with IATUL present and past presidents and other office bearers of the associations provided useful sources of information. It is also attempted to pro- vide relevant information for those interested to join IATUL for professional development.

  20. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  1. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  2. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  3. Implementation of RFID Technology in University of Pune Library

    Science.gov (United States)

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  4. Application of Information Technology in Nigerian special libraries in ...

    African Journals Online (AJOL)

    Also some of the problems impeding promotion of the use of the information technology in the libraries were highlighted as well as the consequences on effective information storage retrieval and delivery. Four research questions were constructed to serve as a guide. Data were collected through questionnaire, interviews ...

  5. Implications of information technology on the training of library and ...

    African Journals Online (AJOL)

    Implications of information technology on the training of library and information science professionals in Nigeria: an analysis of the curricula of some selected ... Information Impact: Journal of Information and Knowledge Management. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives.

  6. Managing Technological Change in Libraries and Information Services.

    Science.gov (United States)

    Klobas, Jane E.

    1990-01-01

    Examines factors to be considered in the management of technological change in libraries and information services. The organizational climate for change is discussed, and factors to consider when developing a strategy for introducing a new product, service, or system are described, including leadership, goals, political processes, marketing, and…

  7. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  8. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  9. National Security in the Nuclear Age. A Proposed Booklist and Public Education Ideas for Libraries.

    Science.gov (United States)

    Dane, Ernest B.

    A bibliography on national security in the nuclear age is divided into three sections. The first section describes a proposal calling for the compilation of a balanced and up-to-date collection of books and other materials on this issue to be included in all U.S. public libraries. Also discussed are selection criteria for the book list, project…

  10. Advanced technologies: Trends and implications for security

    International Nuclear Information System (INIS)

    Shaw, A.

    1990-01-01

    As the world moves towards the close of the twentieth century, three technological trends will strongly influence security. In order of importance they are: first, the increasing globalization of the ability to develop and use high technology, much of which has both civilian and military applications; secondly, the broad dissemination of militarily-relevant technology world-wide; and thirdly, the continued development by the United States and the USSR (and a few other nations) of advanced technology for military applications. The military balance between the super-Powers and their allies has been strongly rooted in advancing military technology. Great changes in technology have resulted in adjustments -mostly in limited aspects such as the armour/ anti-armour balance - but have not caused it to change wildly. This seems likely to remain the case for the foreseeable future. There are arguments that Western technology has been a prime causative factor behind Soviet willingness to engage in negotiations to reduce forces. They claim that fear of the Strategic Defense Initiative is behind progress in the Strategic Arms Reduction Talks, and that perceived Western mastery of the technology for systems combining quick reaction, deep strike and high kill probabilities led the Soviet Union to reassess its potential for a successful land campaign in Europe. If current arms control negotiations are successful, the momentum is maintained, and other political changes take hold, the military balance could be taken to a point where ft would not be very sensitive to technological change. One should be aware that the arms control negotiations are very complex, primarily because of technological issues, and we should not yet bank on it all working out well. If it fails, the military technical competition will heat up again. Even under a strict arms control regime we can expect the competition to continue as each side seeks to develop counters to what ft sees as the other side

  11. Discussion on construction of scientific and technological digital library in nuclear industry

    International Nuclear Information System (INIS)

    Yin Huilan

    2010-01-01

    With the rapid development of digital and network technology, traditional libraries have been unable to meet the needs of the times. Digital libraries will gradually take the place of traditional libraries. Under the circumstances, how will the libraries of the enterprises in nuclear industry face this transformation? This paper gives the brief descriptions and comparative analyses in the four aspects: the definition of the digital library, the meaning of nuclear scientific and technological digital library, the characteristics of the digital library, and major problems in the construction of nuclear scientific and technological digital library that should be solved. Therefore, setting up the digital library is very important. At the same time, it's very necessary and urgent for the libraries of the enterprises in nuclear industry to establish nuclear scientific and technological digital library. (author)

  12. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  13. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  14. Measuring patrons' technology habits: an evidence-based approach to tailoring library services.

    Science.gov (United States)

    Wu, Jin; Chatfield, Amy J; Hughes, Annie M; Kysh, Lynn; Rosenbloom, Megan Curran

    2014-04-01

    Librarians continually integrate new technologies into library services for health sciences students. Recently published data are lacking about student ownership of technological devices, awareness of new technologies, and interest in using devices and technologies to interact with the library. A survey was implemented at seven health sciences libraries to help answer these questions. Results show that librarian assumptions about awareness of technologies are not supported, and student interest in using new technologies to interact with the library varies widely. Collecting this evidence provides useful information for successfully integrating technologies into library services.

  15. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers

    OpenAIRE

    Lease, David R.

    2005-01-01

    The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examini...

  16. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  17. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  18. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  19. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  20. Investigating the issue of copyright and security measures in digital libraries

    Directory of Open Access Journals (Sweden)

    Sedigheh Ahmadi Fasih

    2013-11-01

    Full Text Available During the past few years, digital libraries have been the primary source of retrieving necessary information. IT helps many scholars have the access to recently published value added researches around the world. However, information security and copyright concerns are among the most important issues and there must be good rules and regulation to protect authors against any sort of copyright violation. In this paper, we present an empirical investigation to find out about the status of copyright issues in one of Iranian libraries. The proposed study of this paper designs a questionnaire in Likert scale and distributes it among 96 librarian experts. Cronbach alpha is equal to 0.76, which is well above the minimum acceptable level. The results of our investigation indicate that although expert believe the status of copyright is in desirable level when the level of significance is five percent, there are some concerns on some issues. In other words, experts believed that all copyrights are not well protected and digital libraries do not follow governmental rules and regulation on fully protecting authors’ rights. In addition, experts believed that the security of sources available on digital libraries is not well protected.

  1. The Impact of Information Technology on Library Anxiety: The Role of Computer Attitudes

    Directory of Open Access Journals (Sweden)

    Qun G. Jiao

    2017-09-01

    Full Text Available Over the past two decades, computer-based technologies have become dominant forces to shape and reshape the products and services the academic library has to offer. The applicationo of library technologies has had a profound impact on the way library resources are being used. Although many students continue to experience high levels of library anxiety, it is likely that the new technologies in the library have led to them experiencing other forms of negative affective states that may be, in part, a function of their attitude towards computers. This study investigates whether students' computer attitudes predict levels of library anxiety.

  2. On the new situation to descend a basic level technology library information service work

    International Nuclear Information System (INIS)

    Sun Haiyan

    2010-01-01

    With information technology fast developing. library can give readers modernization service. The results of information technology revolution can be used in library. Information materials can be supplied by acoustic image and researching in internet. In this document, we analysis the characteristics, present situations and developments of grass-roots libraries. Discuss the questions in grass-roots science-technology library in nuclear industry, improving the grass-roots equipments, developing various data library, and how to improve the quality of information service in grass-roots library. (author)

  3. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  4. DO Get Technical! Using Technology in Library Instruction

    Directory of Open Access Journals (Sweden)

    Nicole Eva

    2011-12-01

    Full Text Available Today’s post-secondary students are digital natives. Much has been said and written about how to reach this generation, and the consensus seems to be that we need to meet them on their turf. In this session presented at WILU 2011 in Regina, SK, two librarians from the University of Lethbridge shared their experiences with using technology to engage students in library instruction. The hands-on session introduced some simple tools librarians can learn quickly and apply to spice up their instruction with technology. These include creating online animated videos using Xtranormal, a low-cost tool way to create polished and humourous videos to introduce or summarize key information literacy concepts; and adding interactive polling to PowerPoint presentations using a tool called Poll Everywhere, which is an effective way to instantly engage students in instruction using the web or web-enabled devices. Interactive polling eliminates many of the challenges of using clickers which are prevalent in many post-secondary library instruction environments. The presenters also discussed how they have experimented with wikis to encourage active learning and student collaboration in a series of library instruction sessions. Wikis allow for free and paperless student participation in knowledge creation in an online forum. Finally, they demonstrated how they have used Skype to deliver library instruction at a distance, including the use of the screen sharing feature. The presenters stressed the ease of use of these free or low-cost tools to improve classroom engagement and add interest to sessions.

  5. Center for Coastline Security Technology, Year-2

    Science.gov (United States)

    2007-05-01

    cinematic film industry . For the port security application there are several research issues being addressed under this program, specifically...being the cinematic film industry . For the port security application there are several research issues being addressed under this program...the primary customers being the film industry . For the port security application there are several research issues being addressed under this program

  6. Technology in the Public Library: Results from the 1992 PLDS Survey of Technology.

    Science.gov (United States)

    Fidler, Linda M.; Johnson, Debra Wilcox

    1994-01-01

    Discusses and compares the incorporation of technology by larger public libraries in Canada and the United States. Technology mentioned includes online public access catalogs; remote and local online database searching; microcomputers and software for public use; and fax, voice mail, and Telecommunication Devices for the Deaf and Teletype writer…

  7. Improving Information Access through Technology: A Plan for Louisiana's Public Libraries.

    Science.gov (United States)

    Jaques, Thomas F.

    Strengthening technology in Louisiana's public libraries will support equitable and convenient access to electronic information resources for all citizens at library sites, in homes, and in business. The plan presented in this document is intended to enhance and expand technology in the state's public libraries. After discussion of the crucial…

  8. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  9. Technology for small and one-person libraries a LITA guide

    CERN Document Server

    Erlandson, Rene J

    2013-01-01

    Written for librarians, library staff, and administrators at libraries serving populations of 15,000 or less, this LITA guide shows how to successfully develop, implement, sustain, and grow technology initiatives.

  10. ENDF/B-VII.0: Next Generation Evaluated Nuclear Data Library for Nuclear Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    Chadwick, M B; Oblozinsky, P; Herman, M; Greene, N M; McKnight, R D; Smith, D L; Young, P G; MacFarlane, R E; Hale, G M; Haight, R C; Frankle, S; Kahler, A C; Kawano, T; Little, R C; Madland, D G; Moller, P; Mosteller, R; Page, P; Talou, P; Trellue, H; White, M; Wilson, W B; Arcilla, R; Dunford, C L; Mughabghab, S F; Pritychenko, B; Rochman, D; Sonzogni, A A; Lubitz, C; Trumbull, T H; Weinman, J; Brown, D; Cullen, D E; Heinrichs, D; McNabb, D; Derrien, H; Dunn, M; Larson, N M; Leal, L C; Carlson, A D; Block, R C; Briggs, B; Cheng, E; Huria, H; Kozier, K; Courcelle, A; Pronyaev, V; der Marck, S

    2006-10-02

    biases in fast systems are largely removed; (c) ENDF/B-VI.8 good agreement for simulations of highly enriched uranium assemblies is preserved; (d) The underprediction of fast criticality of {sup 233,235}U and {sup 239}Pu assemblies is removed; and (e) The intermediate spectrum critical assemblies are predicted more accurately. We anticipate that the new library will play an important role in nuclear technology applications, including transport simulations supporting national security, nonproliferation, advanced reactor and fuel cycle concepts, criticality safety, medicine, space applications, nuclear astrophysics, and nuclear physics facility design. The ENDF/B-VII.0 library is archived at the National Nuclear Data Center, BNL. The complete library, or any part of it, may be retrieved from www.nndc.bnl.gov.

  11. Nuclear Technologies Secure Food For Future

    International Nuclear Information System (INIS)

    2012-01-01

    use of such techniques to protect plants and animals against disease and pests means many more farmers can produce enough food to feed their own families and to sell on markets. Ultimately, fewer people go hungry. The IAEA collaborates with the United Nations Food and Agriculture Organization (FAO) in providing support through a joint division in Vienna. ''While our profile is modest, the size of our footprint is significant,'' said Qu Liang, Director of the Joint FAO/IAEA Division of Nuclear Techniques. ''We are putting the benefits of tried and tested nuclear technologies into the hands of farmers, particularly small producers in poorer countries, to improve their food security and livelihood.'' ''The assistance is driven by advanced technologies,'' Liang added. ''But what we are delivering has to be appropriate to farmers' needs. That means crops that can flourish in changing and often harsher conditions, pest control without a chemical legacy and protection for livestock.'' The Scientific Forum will be opened by the IAEA Director General and ministers from Indonesia, Kenya and Vietnam. FAO Director General Graziano da Silva will deliver a video address. The Forum will address IAEA activities in the fields of food production, food protection and food safety. Each session features a panel of experts who will present and discuss the benefits of nuclear techniques in food and agriculture. A moderator will guide the discussions. (IAEA)

  12. Promoting Economic Security through Information Technology ...

    African Journals Online (AJOL)

    The problem of economic insecurity is a global threat to national security. In Nigeria today, we have witness a lot of national security issues that risks the continued existence of the country as one indivisible political entity with many calling for disintegration. Hitherto, many terrorist networks have sprang up in many parts of ...

  13. Evaluation of the central libraries information security management at governmental universities located in Tehran, according to the international standard ISO/IEC 27002

    Directory of Open Access Journals (Sweden)

    Milad Malekolkalami

    2014-02-01

    Full Text Available This study assessed the evaluation of information security management status in central Libraries of governmental universities located in Tehran, according to ISO / I.E.C. 27002. Research method applied for the study is descriptive Survey and a questionnaire was used for collecting information. The questionnaire was distributed between the 74 central library managers of governmental universities in Tehran according to the recent list on the website of Ministry of Science, Research and Technology, that includes 39 components based on 11 indicators of the standard ISO/ I.E.C. 27002. Analysis of data has been done by using both descriptive and inferential statistics by Microsoft Excel 2007and SPSS statistical softwares. The results of research showed that the mean for libraries in 11 indexes are as follows: The mean for the first index, Security policy, is 3.91 , in the second index, organization of information security, is 4.23, in the third index, asset security management, is 4.38, in the fourth index, Human Resources Security management, is 4, in the fifth index, physical and environment Security management, is 4.07, in the sixth index, operations management and communications, is 4.15, in the Seventh index, access controls management, is 4.38, in the eighth index, information system acquisition, development and maintenance, is 3.92, in the ninth index, information security incident management, is 3.84, in the tenth index, business continuity management, is 3.46, in the eleventh index, compliance, is 3.69 that match with the standard ISO / IEC. 27002. The results of Research shown that totally mean for standard ISO/I.E.C. 27002 in the field of information security management in the central libraries, is 4 being in a good condition and there is no significant differences between the performance of the Central libraries of the governmental Universities in Tehran, since It is not observed significant difference between them in the field of

  14. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  15. End-user satisfaction analysis on library management system unnes using technology acceptance model towards national standard of integrated library

    Science.gov (United States)

    Hardyanto, W.; Purwinarko, A.; Adhi, M. A.

    2018-03-01

    The library which is the gate of the University should be supported by the existence of an adequate information system, to provide excellent service and optimal to every user. Library management system that has been in existence since 2009 needs to be re-evaluated so that the system can meet the needs of both operator and Unnes user in particular, and users from outside Unnes in general. This study aims to evaluate and improve the existing library management system to produce a system that is accountable and able to meet the needs of end users, as well as produce a library management system that is integrated Unnes. Research is directed to produce evaluation report with Technology Acceptance Model (TAM) approach and library management system integrated with the national standard.

  16. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  17. "A Really Nice Spot": Evaluating Place, Space, and Technology in Academic Libraries

    Science.gov (United States)

    Khoo, Michael J.; Rozaklis, Lily; Hall, Catherine; Kusunoki, Diana

    2016-01-01

    This article describes a qualitative mixed-method study of students' perceptions of place and space in an academic library. The approach is informed by Scott Bennett's model of library design, which posits a shift from a "book-centered" to a technology supported "learning centered" paradigm of library space. Two surveys…

  18. Are We Ready for the Virtual Library? Technology Push, Market Pull and Organisational Response.

    Science.gov (United States)

    Gilbert, J. D.

    1993-01-01

    Discusses virtual libraries, i.e., library services available to users via personal computers; considers the issues of technological development, user demands, and organizational response; and describes progress toward virtual libraries in the Netherlands, including networks, online systems, navigation tools, subject classification, coordination…

  19. The Science, Engineering and Technology Career Library Corner. Final report, February 1, 1995--January 31, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Cole, P.R.

    1996-03-01

    A grant was made to install and pilot-test the Science, Engineering and Technology (SET) Career Library Corner at the New York Hall of Science. The SET Career Library Corner is located in a multi-media library setting where visitors can explore careers in a quiet, uninterrupted environment, in contrast to the original installation designed as a museum floor exhibit.

  20. Mobile technology and academic libraries innovative services for research and learning

    CERN Document Server

    Canuel, Robin

    2017-01-01

    In seventeen chapters ranging from A Mobile-First Library Site Redesign to Mobile Technology Support for Field Research to Virtual Reality Library Environments, Mobile Technology and Academic Libraries explores how librarians around the world are working to adapt their spaces, collections, teaching, and services to the new possibilities presented by mobile technology. This is a detailed and thorough examination of technology that's emerging now and how to incorporate it into your library to help the students and researchers of both today and tomorrow.

  1. ENDF/B-VII.0: Next Generation Evaluated Nuclear Data Library for Nuclear Science and Technology

    International Nuclear Information System (INIS)

    Chadwick, M.B.; Oblozinsky, P.; Herman, M.

    2006-01-01

    agreement for simulations of thermal high-enriched uranium assemblies is preserved; (d) The underprediction of fast criticality of 233,235 U and 239 Pu assemblies is removed; and (e) The intermediate spectrum critical assemblies are predicted more accurately. We anticipate that the new library will play an important role in nuclear technology applications, including transport simulations supporting national security, nonproliferation, advanced reactor and fuel cycle concepts, criticality safety, fusion, medicine, space applications, nuclear astrophysics, and nuclear physics facility design. The ENDF/B-VII.0 library is archived at the National Nuclear Data Center, BNL, and can be retrieved from www.nndc.bnl.gov

  2. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  3. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after crop production. The impacts of global change on food security and the potential impacts of global markets for food and land are also briefly discussed. Nigerian Journal of Technological Research ...

  4. Research Library

    Science.gov (United States)

    Los Alamos National Laboratory Research Library Search Site submit Contact Us | Remote Access Standards Theses/Dissertations Research Help Subject Guides Library Training Video Tutorials Alerts Research Library: delivering essential knowledge services for national security sciences since 1947 Los

  5. The application of RFIDs in libraries : an assessment of technological, management and professional issues

    OpenAIRE

    Gibb, Forbes; Thornley, Clare V.; Ferguson, Stuart; Weckert, John

    2011-01-01

    This paper starts by outlining the technologies involved in RFIDs and reviews the issues raised by their general application. It then identifies their potential application areas within the library sector based on a generic process view of library activities. Finally it highlights the issues that are raised by their application in libraries and provides an assessment of which of these issues are likely to raise ethical concerns for library professionals. The purpose is to provide an overview ...

  6. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  7. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  8. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  9. The influence of the latest information and communication technology on the libraries in the primary schools

    Directory of Open Access Journals (Sweden)

    Franceska Žumer

    2000-01-01

    Full Text Available The article presents the information and communication equipment in primary school libraries and the end usage of the above mentioned technology. A detailed research, including 109 primary schools throughout Slovenia, was performed. The research showed that the schools do not have the basic information technology needed to perform the latest and up-to-date services. Not a single library, included in the research, has a completely automated library collection. But the percentage of libraries, which do not perform automated lending and do not use the various offered possibilites of the already existing technology, automated collections and on-line library, is significantly lower. A systematic solution of the present situation is needed. Only in this way will school libraries be successfully included in the educational system of schools and will be able to perform the library inter-subject information knowledge and information literacy programs in the new nine-year primary school.

  10. THE IMPACT OF TECHNOLOGY ON THE LIBRARY BUILDING.

    Science.gov (United States)

    Educational Facilities Labs., Inc., New York, NY.

    LIBRARY PLANNERS SHOULD EXPECT AUTOMATION, MICROFORMS, AND FACSIMILE TRANSMISSION TO MODIFY BUT NOT RADICALLY CHANGE THE LIBRARY AS THE INSTITUTION WE NOW KNOW IT TO BE. CHANGES WILL INVOLVE TRADE-OFFS IN SPACE AND DEMANDS FOR ADDITIONAL SPACE. (MF)

  11. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  12. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... The problem of economic insecurity is a global threat to national security. ... of the country as one indivisible political entity with many calling for disintegration. ..... The integration of ICT in agriculture can .... Table 4.2.7 Respondents by IT on Business propriety and trade .... of production, distribution and.

  13. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  14. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  15. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  16. Organizational Influences in Technology Adoption Decisions: A Case Study of Digital Libraries

    Science.gov (United States)

    Oguz, Fatih

    2016-01-01

    The purpose of this study was to understand the organizational level decision factors in technology adoption in the context of digital libraries. A qualitative case study approach was used to investigate the adoption of a specific technology, XML-based Web services, in digital libraries. Rogers' diffusion of innovations and Wenger's communities of…

  17. Technological Change in the Workplace: A Statewide Survey of Community College Library and Learning Resources Personnel.

    Science.gov (United States)

    Poole, Carolyn E.; Denny, Emmett

    2001-01-01

    Discussion of the effects of technostress on library personnel focuses on an investigation that examined how employees in Florida community college libraries and learning resources centers are dealing with technological change in their work environment. Considers implications for planning and implementing technological change and includes…

  18. The Implementation of Web 2.0 Technology for Information Literacy Instruction in Thai University Libraries

    Science.gov (United States)

    Sawetrattanasatian, Oranuch

    2014-01-01

    Web 2.0 technology has drawn much attention recently as a fascinating tool for Information Literacy Instruction (ILI), especially in academic libraries. This research was aimed to investigate the implementation of Web 2.0 technology for ILI in Thai university libraries, in terms of information literacy skills being taught, types of Web 2.0…

  19. Applications of a Case Library of Technology Integration Stories for Teachers

    Science.gov (United States)

    Wang, Feng-Kwei; Jonassen, David H.; Strobel, Johannes; Cernusca, Dawn

    2003-01-01

    Stories are the most natural form of communication and learning among humans. In this paper, we describe how we have designed and implemented an case library of technology integration stories to support pre-service and in-service teachers learning how to integrate technologies into their teaching. The case library was built using the artificial…

  20. Reflection on the talent structure of knowledge-service oriented nuclear technology library

    International Nuclear Information System (INIS)

    Zhang Xue; Zhang Ruiping

    2010-01-01

    Nuclear technology library is the only authoritative organization in collection of nuclear technology literatures.It has exceptional advantage and a large number of customers with great requirement. With promotion of network and digitization of information resource, new situation is posed before nuclear technology library-transforming from traditional library to knowledge-service oriented library. In order to carry on knowledge service effectively and conveniently, a variety of talents are essential. So establishing a talent team with high quality and complete specialities is the fundamental guarantee. Based on a great deal research and discussion, requirements for establishment of a talent team are put forward in the paper and suggestion are present: 5 basic specialized talents are required in nuclear technology library, including organization and management talent, basic operation talent, search service talent, technology application talent, information development talent. (authors)

  1. Information and technology: Improving food security in Uganda ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... Information and technology: Improving food security in Uganda ... knowledge to make decisions about planting, harvesting, and managing livestock, but ... to be effective for minimizing risks and increasing agricultural productivity. ... In time, this network of information – made possible by digital technology ...

  2. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  3. M-libraries 4 from margin to mainstream : mobile technologies transforming lives and libraries

    CERN Document Server

    Ally, Mohamed

    2014-01-01

    A brand new edition of the highly successful M-Libraries series, this draws together cutting-edge international contributions from the leading authorities in the field. It explores the variety of work that libraries are doing across the world to deliver resources to users via mobile and hand-held devices.

  4. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  5. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  6. A Survey of Complex Object Technologies for Digital Libraries

    Science.gov (United States)

    Nelson, Michael L.; Argue, Brad; Efron, Miles; Denn, Sheila; Pattuelli, Maria Cristina

    2001-01-01

    Many early web-based digital libraries (DLs) had implicit assumptions reflected in their architecture that the unit of focus in the DL (frequently "reports" or "e-prints") would only be manifested in a single, or at most a few, common file formats such as PDF or PostScript. DLs have now matured to the point where their contents are commonly no longer simple files. Complex objects in DLs have emerged from in response to various requirements, including: simple aggregation of formats and supporting files, bundling additional information to aid digital preservation, creating opaque digital objects for e-commerce applications, and the incorporation of dynamic services with the traditional data files. We examine a representative (but not necessarily exhaustive) number of current and recent historical web-based complex object technologies and projects that are applicable to DLs: Aurora, Buckets, ComMentor, Cryptolopes, Digibox, Document Management Alliance, FEDORA, Kahn-Wilensky Framework Digital Objects, Metadata Encoding & Transmission Standard, Multivalent Documents, Open eBooks, VERS Encapsulated Objects, and the Warwick Framework.

  7. Audit Layanan Teknologi Informasi Berbasis Information Technology Infrastructure Library (ITIL

    Directory of Open Access Journals (Sweden)

    Didin Herlinudinkhaji

    2015-12-01

    Full Text Available IT Service Management adalah salah satu cara untuk mengelola layanan teknologi informasi. Layanan teknologi perlu dikelola dengan baik untuk mendapatkan output dalam bentuk informasi yang dibutuhkan oleh manajemen. Untuk meningkatkan layanan teknologi informasi untuk lebih baik, diperlukan audit meliputi audit layanan teknologi informasi. Audit layanan teknologi informasi dilakukan untuk menentukan kelayakan teknologi informasi denngan terkait, dalam hal ini penulis berfokus pada isu-isu keamanan teknologi informasi. Audit keamanan teknologi informasi dibuat untuk menentukan tingkat keamanan untuk layanan teknologi informasi, sejauh mana informasi tersebut bisa sampai kepada yang berhak menerima, apakah informasi tersebut benar-benar tersedia, apakah informasi tersebut bersifat rahasia. Untuk dapat mengukur tingkat keamanan layanan teknologi informasi, penulis memilih untuk menggunakan metode Information Technology Infrastructure Library Versi 3 (ITIL V3. ITIL adalah set yang terdiri dari Layanan Strategi, Jasa Desain, Jasa Transisi, Layanan Operasi, dan terus-menerus Peningkatan Pelayanan. Dalam hal ini penulis berfokus pada layanan desain pada bagian dari manajemen keamanan informasi, pada bagian ini menjelaskan bagaimana layanan dikatakan baik jika memenuhi 8 poin yang telah distandarisasi secara internasional.

  8. ShockWave science and technology reference library

    CERN Document Server

    2007-01-01

    This book is the first of several volumes on solids in the Shock Wave Science and Technology Reference Library. These volumes are primarily concerned with high-pressure shock waves in solid media, including detonation, high-velocity impact, and penetration. Of the eight chapters in this volume three chapters survey recent, exciting experimental advances in - ultra-short shock dynamics at the atomic and molecular scale (D.S. More, S.D. Mcgrane, and D.J. Funk), - Z accelerator for ICE and Shock compression (M.D. Knudson), and - failure waves in glass and ceramics (S.J. Bless and N.S. Brar). The subsequent four chapters are foundational, and cover the subjects of - equation of state (R. Menikoff), - elastic-plastic shock waves (R. Menikoff), - continuum plasticity (R. M. Brannon), and - numerical methods (D. J. Benson). The last chapter, but not the least, describes a tour de force illustration of today’s computing power in - modeling heterogeneous reactive solids at the grain scale (M.R. Baer). All chapters a...

  9. The Leadership Dimension in Information and Communication Technology Adoption in African Libraries

    Directory of Open Access Journals (Sweden)

    Adetoun A. Oyelude

    2014-02-01

    Full Text Available The article focuses on leadership challenges in adaptation to Information and Communication Technologies (ICTs in African libraries. It identifies and discusses the need for adequate leadership styles and behavior in the bid to adapt effectively to new technologies. Online survey, observation arising from personal professional practice experience, personal communication, and interview methods were used to gather data for the study. Older library professionals, many of whom are still very visible across the leadership strata of libraries, were found to exhibit diverse attitude to the adaptation to ICTs deployment and use in their libraries. Some library leaders and older generation professionals were discovered to react somewhat negatively to changes in technology used in their libraries, preventing the younger professionals from performing to full capacity, and generally showing nonchalance to new technologies. Proper training and retraining, mentoring, and harnessing the synergy of ideas, with respectful communication from new generation library professionals, was found to be desirable. Change management workshops and implementation of standard ethics of the profession are recommended, while emphasis is put on the need for library professionals to overcome their technophobia and take leadership in adapting to move the library and information profession forward.

  10. Looking Toward the Future of Library Technology. The Systems Librarian

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    This article discusses trends in five areas relating to software developed for libraries, and based on these trends, the author's predictions for developments that might play out in the next few years. The author's predictions, based on his own empirical observations, include: (1) the integrated library system (ILS) will be reintegrated; (2) the…

  11. Libraries as a venue for exciting education technology, both high tech and low

    Science.gov (United States)

    Harold, J. B.; Dusenbery, P.; Holland, A.

    2016-12-01

    Public libraries provide a broad range of possibilities for reaching diverse audiences with NASA and STEM related content and activities, from hands-on activities, to interactive kiosks incorporating science based games, simulations, and real-time data. NCIL/SSI has been developing STEM-based exhibits and program activities for public libraries since 2007, and is currently managing 7 national tours in partnership with the American Library Association and other organizations. Past and current exhibitions will reach over 100 libraries and an estimated 1.5 million patrons. In this paper we will discuss a range of findings from almost a decade of deploying both high and low tech STEM learning strategies into libraries, including usage and engagement by library patrons, and challenges (and solutions) for deploying technologically sophisticated components into libraries which may or may not have dedicated technical staff.

  12. E-Books and New Library Service Models: An Analysis of the Impact of E-Book Technology on Academic Libraries.

    Science.gov (United States)

    Jantz, Ronald

    2001-01-01

    Analyzes the implications of electronic book technology (e-books) on academic libraries. Discusses new business models for publishers, including self-publishing, Internet publishing, and partnerships with libraries as publishers; impact on library services, including cataloging, circulation, and digital preservation; user benefits; standards;…

  13. Security and privacy issues with health care information technology.

    Science.gov (United States)

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  14. Rapid access to compound libraries through flow technology: fully automated synthesis of a 3-aminoindolizine library via orthogonal diversification.

    Science.gov (United States)

    Lange, Paul P; James, Keith

    2012-10-08

    A novel methodology for the synthesis of druglike heterocycle libraries has been developed through the use of flow reactor technology. The strategy employs orthogonal modification of a heterocyclic core, which is generated in situ, and was used to construct both a 25-membered library of druglike 3-aminoindolizines, and selected examples of a 100-member virtual library. This general protocol allows a broad range of acylation, alkylation and sulfonamidation reactions to be performed in conjunction with a tandem Sonogashira coupling/cycloisomerization sequence. All three synthetic steps were conducted under full automation in the flow reactor, with no handling or isolation of intermediates, to afford the desired products in good yields. This fully automated, multistep flow approach opens the way to highly efficient generation of druglike heterocyclic systems as part of a lead discovery strategy or within a lead optimization program.

  15. Dynamically-Loaded Hardware Libraries (HLL) Technology for Audio Applications

    DEFF Research Database (Denmark)

    Esposito, A.; Lomuscio, A.; Nunzio, L. Di

    2016-01-01

    In this work, we apply hardware acceleration to embedded systems running audio applications. We present a new framework, Dynamically-Loaded Hardware Libraries or HLL, to dynamically load hardware libraries on reconfigurable platforms (FPGAs). Provided a library of application-specific processors......, we load on-the-fly the specific processor in the FPGA, and we transfer the execution from the CPU to the FPGA-based accelerator. The proposed architecture provides excellent flexibility with respect to the different audio applications implemented, high quality audio, and an energy efficient solution....

  16. Application of new technologies in the virtual library: Seminars in Turkey, Portugal, and Spain

    Science.gov (United States)

    Hunter, Judy F.; Cotter, Gladys A.

    1994-01-01

    This paper focuses on the technologies that are available today to support the concept of a virtual library. The concept of a 'virtual library' or a 'library without walls' is meant to convey the idea that information in any format should be available to the end-user from the desktop as if it were located on the local workstation. Discussed here are the background, trends, technology enablers, end-user requirements, and the NASA Access Mechanism (NAM) system, one example of how it is possible to apply existing technologies to the client server architecture to logically centralize geographically distributed applications and information.

  17. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  18. Self-Service Charge Systems: Current Technological Applications and Their Implications for the Future Library.

    Science.gov (United States)

    Mardikian, Jackie

    1995-01-01

    Discusses a possible shift to self-service check-out systems for academic library patrons. Provides an annotated bibliography of 51 items that discuss the impact of self-service technology on the quality of service and customer satisfaction in libraries, service sectors, banking, and the vending industry. (LRW)

  19. The Status of Information Technology in Iranian Hospital Libraries: A Comparative Study of Managers' Attitude

    Science.gov (United States)

    Isfandyari-Moghaddam, Alireza; Sedehi, Maryam; Dehghani, Mozhdeh; Nemati-Anaraki, Leila; Hasanzadeh-Dizaji, Elaheh

    2013-01-01

    Purpose: The purpose of this paper is to compare the attitude of the managers of libraries located at Iran, Tehran and Shahid Beheshti Medical Sciences Universities' training hospitals, on the status of information technology (IT) in the mentioned libraries. Design/methodology/approach: This study employed a researcher-made questionnaire. The…

  20. Technological energy and environmental refurbishment of historical Italian libraries

    OpenAIRE

    Alessandra Battisti; Fabrizio Tucci

    2014-01-01

    Active libraries in Italy are around 13.000 and, taken as a whole, the property and management relate mainly to public institutions such as the state, regions, local authorities, cultural institutions, universities, and partly to religious institutions and individuals. In this paper is presented the work of studies and research, commissioned to the authors by the General Direction for Libraries of the Ministry of Heritage and Culture (Mibac), which ended recently, addressing the architectural...

  1. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  2. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys, Inc., Bolder Technologies Corp., Boyds Wheels, Inc... securities of Biometrics Security Technology, Inc. because it has not filed any periodic reports since...

  3. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  4. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  5. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    Science.gov (United States)

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  6. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  7. Biofuels. Environment, technology and food security

    International Nuclear Information System (INIS)

    Escobar, Jose C.; Lora, Electo S.; Venturini, Osvaldo J.; Yanez, Edgar E.; Castillo, Edgar F.; Almazan, Oscar

    2009-01-01

    The imminent decline of the world's oil production, its high market prices and environmental impacts have made the production of biofuels to reach unprecedent volumes over the last 10 years. This is why there have been intense debates among international organizations and political leaders in order to discuss the impacts of the biofuel use intensification. Besides assessing the causes of the rise in the demand and production of biofuels, this paper also shows the state of the art of their world's current production. It is also discussed different vegetable raw materials sources and technological paths to produce biofuels, as well as issues regarding production cost and the relation of their economic feasibility with oil international prices. The environmental impacts of programs that encourage biofuel production, farmland land requirements and the impacts on food production are also discussed, considering the life cycle analysis (LCA) as a tool. It is concluded that the rise in the use of biofuels is inevitable and that international cooperation, regulations and certification mechanisms must be established regarding the use of land, the mitigation of environmental and social impacts caused by biofuel production. It is also mandatory to establish appropriate working conditions and decent remuneration for workers of the biofuels production chain. (author)

  8. A Structural Contingency Theory Model of Library and Technology Partnerships within an Academic Library Information Commons

    Science.gov (United States)

    Tuai, Cameron K.

    2011-01-01

    The integration of librarians and technologists to deliver information services represents a new and potentially costly organizational challenge for many library administrators. To understand better how to control the costs of integration, the research presented here will use structural contingency theory to study the coordination of librarians…

  9. Roadmap for RFID Implementation in Central library, PEC University of Technology

    OpenAIRE

    Vasishta, Seema

    2009-01-01

    This paper gives brief idea about the emerging Radio Frequency Identification (RFID) technology, its importance in the library management system and its working. It also describes about the basic and optional components required for smooth working of the exercise. The aim is to consider how to extend RFID applications in an academic library keeping in view the scantiness of funds and scarcity of supporting staff. The article also illustrates a vivid picture about how RFID technology is acting...

  10. Opportunities and Challenges for Technology Development and Adoption in Public Libraries

    DEFF Research Database (Denmark)

    Serholt, Sofia; Eriksson, Eva; Dalsgaard, Peter

    2018-01-01

    In this paper, we discuss opportunities and challenges for technology development and adoption in public libraries. The results are based on a multi-site comparative study and thematic analysis of six months of extensive ethnographic work in libraries in three different European countries....... The results explore the socio-technical practices, understandings, and perspectives of library staff and patrons when it comes to the role(s) and function(s) of libraries today. The contribution of this paper is two fold. Firstly, the results from the analysis of rich ethnographic data presented under six...... themes. Secondly, we offer a list of identified key opportunities and challenges focusing on 1) media and technology literacy, 2) institutional transformation and technical infrastructures, 3) resource constraints among library staff, and 4) a shift in focus towards supporting activities....

  11. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  12. Motivation and library management

    Directory of Open Access Journals (Sweden)

    Tatjana Likar

    2000-01-01

    Full Text Available The present article deals with motivation, its relation to management and its role and use in librarianship in our country and abroad. The countries where librarianship is well developed started to deal with library management and questions of motivation of library workers decades ago, whereas elsewhere the subject is at its start. The prerequisite for modern policy making is attention to the elements of modern library management. Librarians, library managers and directors of libraries should create a work environment providing long term satisfaction with work by means of certain knowledge and tools. The level of motivation of the staff is influenced by the so called higher factors deriving from the work process itself and related to work contents: achieve¬ment, recognition, trust and work itself. Extrinsic factors (income, interpersonal relations, technology of administration, company policy, working conditions, work con¬trol, personal security, job security and position... should exercise lesser impact on the level of motivation.

  13. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  14. Library

    OpenAIRE

    Dulaney, Ronald E. Jr.

    1997-01-01

    This study began with the desire to design a public town library of the future and became a search for an inkling of what is essential to Architecture. It is murky and full of contradictions. It asks more than it proposes, and the traces of its windings are better ordered through collage than logical synthesis. This study is neither a thesis nor a synthesis. When drawing out the measure of this study it may be beneficial to state what it attempts to place at the ...

  15. The Energy Science and Technology Database on a local library system: A case study at the Los Alamos National Research Library

    Energy Technology Data Exchange (ETDEWEB)

    Holtkamp, I.S.

    1994-10-01

    This paper presents an overview of efforts at Los Alamos National Laboratory to acquire and mount the Energy Science and Technology Database (EDB) as a citation database on the Research Library`s Geac Advance system. The rationale for undertaking this project and expected benefits are explained. Significant issues explored are loading non-USMARC records into a MARC-based library system, the use of EDB records to replace or supplement in-house cataloging of technical reports, the impact of different cataloging standards and database size on searching and retrieval, and how integrating an external database into the library`s online catalog may affect staffing and workflow.

  16. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  17. Digital Libraries: The Next Generation in File System Technology.

    Science.gov (United States)

    Bowman, Mic; Camargo, Bill

    1998-01-01

    Examines file sharing within corporations that use wide-area, distributed file systems. Applications and user interactions strongly suggest that the addition of services typically associated with digital libraries (content-based file location, strongly typed objects, representation of complex relationships between documents, and extrinsic…

  18. User-Focused Strategic Services for Technological University Libraries.

    Science.gov (United States)

    Townley, Charles T.

    This paper describes the New Mexico State University (NMSU) Library's strategic plan to develop its services amid an atmosphere of change. A summary of the following components of the strategic plan is given: vision; mission; values; and goals. The revised organizational functions are then illustrated, as well as the role of the selector-liaison…

  19. Technological energy and environmental refurbishment of historical Italian libraries

    Directory of Open Access Journals (Sweden)

    Alessandra Battisti

    2014-10-01

    Full Text Available Active libraries in Italy are around 13.000 and, taken as a whole, the property and management relate mainly to public institutions such as the state, regions, local authorities, cultural institutions, universities, and partly to religious institutions and individuals. In this paper is presented the work of studies and research, commissioned to the authors by the General Direction for Libraries of the Ministry of Heritage and Culture (Mibac, which ended recently, addressing the architectural, energy and environmental refurbishment of national historic libraries distributed on the Italian territory, with special focus on 4 among 46 owned by the Ministry of Culture (the Nazionale Centrale di Roma, the Nazionale Centrale in Florence, the national University of Turin and the Angelica in Rome believed by the authors and client as examples of recurring issues and ideals to lend itself to the construction of a model of intervention replicable on other historical Italian libraries.The main objective of the project is the identification of physical and perceptual factors of wear2, which threaten the conservation of the historical and artistic heritage of the historic center of Venice, with a particular focus on the effects of anthropogenic pressure linked to tourism, and the evaluation of their level of danger. A further objective is the recognition of measurable parameters (indicators for monitoring and, subsequently, mitigation strategies for the most significant phenomena.

  20. Computers behind bars : Information technology in Canadian prison libraries

    DEFF Research Database (Denmark)

    Prange, Laurie

    of information can have upon Canadian prison libraries. Gathered information is compared with the results of Canadian policy regarding the provision of information to inmates. The analysis of the collected facts can provide insight to help prison librarians deal with the increasing popularity of electronic...

  1. Sharing of information and knowledge among staff in King Abdullah University of Science and Technology (KAUST) library

    KAUST Repository

    Ramli, Rindra M.

    2011-01-01

    This paper describes strategies and initiatives undertaken by the King Abdullah University of Science and Technology (KAUST) library in sharing information and knowledge among its staff. KAUST Library adopted several IT platforms to enable staff

  2. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  3. Arrayed antibody library technology for therapeutic biologic discovery.

    Science.gov (United States)

    Bentley, Cornelia A; Bazirgan, Omar A; Graziano, James J; Holmes, Evan M; Smider, Vaughn V

    2013-03-15

    Traditional immunization and display antibody discovery methods rely on competitive selection amongst a pool of antibodies to identify a lead. While this approach has led to many successful therapeutic antibodies, targets have been limited to proteins which are easily purified. In addition, selection driven discovery has produced a narrow range of antibody functionalities focused on high affinity antagonism. We review the current progress in developing arrayed protein libraries for screening-based, rather than selection-based, discovery. These single molecule per microtiter well libraries have been screened in multiplex formats against both purified antigens and directly against targets expressed on the cell surface. This facilitates the discovery of antibodies against therapeutically interesting targets (GPCRs, ion channels, and other multispanning membrane proteins) and epitopes that have been considered poorly accessible to conventional discovery methods. Copyright © 2013. Published by Elsevier Inc.

  4. Blockchain Technology: A new secured Electronic Health Record System

    OpenAIRE

    Tamazirt , Lotfi; Alilat , Farid; Agoulmine , Nazim

    2018-01-01

    International audience; Nowadays, health systems are looking for effective ways to manage more patients in a shorter time, and to increase the quality of care through better coordination to provide quick, accurate and non-invasive diagnostics to patients. This paper aims to solve the dependence on trusted third parties by proposing a new management strategy, storage and security in a decentralized network through Blockchain technology. The proposed system also aims to offer a solution to help...

  5. Proceedings of the 1989 Carnahan conference on security technology

    International Nuclear Information System (INIS)

    DeVore, R.W.

    1989-01-01

    This book contains the proceedings of the 1989 Carnahan conference on security technology and crime countermeasures. Topics covered include: study of methods for the enhancement of classified document control and protection; research and development of a portable microfocus x-ray system capable of providing ultra-high resolution images of improvised explosive devices; and BombCAD - a CAD-based technique for assessing bomb vulnerability and designing and evaluating bomb defense measures

  6. Information technology potentials for inter-library loan and cooperation

    African Journals Online (AJOL)

    No Abstract. Lagos Journal of Library and Information Science Vol. 1(2) 2003: 106-112. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/ljlis.v1i2.35484 · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for ...

  7. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  8. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  9. RANCANGAN INFORMATION TECHNOLOGY SERVICE MANAGEMENT MENGGUNAKAN INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (Studi Kasus: STMIK AMIKOM Purwokerto

    Directory of Open Access Journals (Sweden)

    Nurfaizah Nurfaizah

    2015-08-01

    Full Text Available STMIK AMIKOM Purwokerto merupakan salah satu perguruan tinggi swasta yang dalam proses pengelolaan dan  penyampaian informasi telah menerapan teknologi informasi. Proses pelayanan suatu perguruan tinggi dipandang sebagai suatu solusi yang nantinya dapat meningkatkan kemampuan perusahaan di dalam pelayanan. Hal ini menyebabkan pentingnya peningkatan peran teknologi informasi agar selaras dengan  investasi baik hardware dan software yang dikeluarkan, sehingga dibutuhkan perencanaan yang optimal.IT Service Management (ITSM digunakan sebagai upaya untuk meningkatkan efisiensi pelayanan teknologi informasi kepada pengguna yang terdapat dalam framework Information Technology Infrastructure Library.Diharapkan dengan penerapan ITSM pengelolaan layanan TI menjadi lebih baik serta mampu menyelesaikan beberapa permasalahan yang ada pada organisasiyang sedang berjalan dengan menggunakan COBIT 4.1. ITSM menghasilkan perancangan pada masing-masing prosesnya dari 2 domain pembangun ITSM yaitu domain service support dan service delivery. Kata Kunci: ITSM, ITIL V3, COBIT 4.1

  10. Digital Libraries with Embedded Values: Combining Insights from LIS and Science and Technology Studies

    Science.gov (United States)

    Fleischmann, Kenneth R.

    2007-01-01

    In the digital age, libraries are increasingly being augmented or even replaced by information technology (IT), which is often accompanied by implicit assumptions of objectivity and neutrality, yet the field of science and technology studies (STS) has a long history of studying what values are embedded in IT and how they are embedded. This article…

  11. Wireless Technology in the Library: The RIT Experience: Overview of the Project.

    Science.gov (United States)

    Pitkin, Pat

    2001-01-01

    Provides an overview of a project at RIT (Rochester Institute of Technology) that experimented with wireless technology, including laptop computers that circulate within the library building. Discusses project requirements, including ease of use, low maintenance, and low cost; motivation, including mobility; implementation; and benefits to the…

  12. Uranium mining and metallurgy library science and technology literature retrieval of network

    International Nuclear Information System (INIS)

    Tang Lilei

    2014-01-01

    This paper introduces the network resources and characteristics retrieve service of Beijing research Institute of Chemical Engineering of Metallurgy library, Analyzes the problems often encountered in the literature retrieval in science and technology, And puts forward the solution, Puts forward the thinking and Suggestions of science and technology literature retrieval. (author)

  13. Impact of information technology on the role of medical libraries in information managment: normative background

    Directory of Open Access Journals (Sweden)

    Anamarija Rožić-Hristovski

    1998-01-01

    Full Text Available Exponential growth of biomedical knowledge and information technology development is changing the infrastructure of health care systems, education and research. So medical libraries roles have shifted from managing containers of information toward influencing biomedical information resource content and education. These new tasks are formalised in modem American standards for medical libraries, stressing information management role in evolving environment.In Slovenia medical libraries also are aware of development imperative of information activities for advances in medicine. At one side they are faced with lack of specific guidelines for proactive action and on the other with inadequate assessment in legal documents and insufficient funding.

  14. Implementing Technology and Gaming Lessons in a School Library

    Science.gov (United States)

    Mashriqi, Khalida

    2011-01-01

    School librarians play numerous roles throughout a day. They are information specialists who keep up with the constant changes in information and technology. It is important for them to keep students up-to-date and teach them to use technology properly. Gaming and technology are both important concepts for 21st-century school librarians to…

  15. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  16. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  17. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  18. Technology library modeling for information-driven circuit synthesis

    NARCIS (Netherlands)

    Jozwiak, L.; Bieganski, S.J.

    2008-01-01

    Due to weaknesses in circuit synthesis methods used in todaypsilas CAD tools, the opportunities created by modern microelectronic technology cannot effectively be exploited. This paper considers major issues and requirements of circuit synthesis for the nano CMOS technologies, and discusses our new

  19. Case Library Construction Technology of Energy Loss in Distribution Networks Considering Regional Differentiation Theory

    Directory of Open Access Journals (Sweden)

    Ze Yuan

    2017-11-01

    Full Text Available The grid structures, load levels, and running states of distribution networks in different supply regions are known as the influencing factors of energy loss. In this paper, the case library of energy loss is constructed to differentiate the crucial factors of energy loss in the different supply regions. First of all, the characteristic state values are selected as the representation of the cases based on the analysis of energy loss under various voltage classes and in different types of regions. Then, the methods of Grey Relational Analysis and the K-Nearest Neighbor are utilized to implement the critical technologies of case library construction, including case representation, processing, analysis, and retrieval. Moreover, the analysis software of the case library is designed based on the case library construction technology. Some case studies show that there are many differences and similarities concerning the factors that influence the energy loss in different types of regions. In addition, the most relevant sample case can be retrieved from the case library. Compared with the traditional techniques, constructing a case library provides a new way to find out the characteristics of energy loss in different supply regions and constitutes differentiated loss-reducing programs.

  20. the relevance of libraries and information communicaton technology

    African Journals Online (AJOL)

    GRACE

    Information and Communications Technology (ICT) could be used to improve .... accountable, efficient and effective interaction between the public, business and ... agencies, research institutions and private organizations, such as print and ...

  1. Information and communication technologies for knowledge management in academic libraries in Nigeria and South Africa

    Directory of Open Access Journals (Sweden)

    Rexwhite T. Enakrire

    2017-05-01

    improve the understanding of how librarians manage the organisation in present-day library operations. We recommend that staff development be intensified to enable how librarians could cope with changes and new technologies for modern information services being encouraged and acquired. This article provides a unique long-term survey on the use of ICT facilities and services, strategy and structure in an academic and/or university library services.

  2. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  3. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  4. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  5. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  6. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  7. Library Informational Technology Workers: Their Sense of Belonging, Role, Job Autonomy and Job Satisfaction

    Science.gov (United States)

    Lim, Sook

    2007-01-01

    This study examines the characteristics of library information technology (IT) workers using a mail survey. The IT workers showed a moderate level of a sense of belonging, playing the broker's role, job autonomy, and job satisfaction. There were differences between librarian IT workers and non-librarian IT workers regarding most of these…

  8. Tinkering with Technology: A Library Workshop to Support 4-H Youth Development

    Science.gov (United States)

    Hendrix, Beth; Williamson, Evan

    2017-01-01

    When University of Idaho (UI) Extension brought the Idaho 4-H Teen Conference to UI's main campus, the conference organizers collaborated with UI librarians to organize a workshop in the library's newly established makerspace, the Making, Innovating, and Learning Laboratory (MILL). In the MILL, the students used cutting-edge technology to foster…

  9. New Information Technologies: Some Observations on What Is in Store for Libraries.

    Science.gov (United States)

    Black, John B.

    This outline of new technological developments and their applications in the library and information world considers innovations in three areas: automation, telecommunications, and the publishing industry. There is mention of the growth of online systems, minicomputers, microcomputers, and word processing; the falling costs of automation; the…

  10. Proposal for Implementing Multi-User Database (MUD) Technology in an Academic Library.

    Science.gov (United States)

    Filby, A. M. Iliana

    1996-01-01

    Explores the use of MOO (multi-user object oriented) virtual environments in academic libraries to enhance reference services. Highlights include the development of multi-user database (MUD) technology from gaming to non-recreational settings; programming issues; collaborative MOOs; MOOs as distinguished from other types of virtual reality; audio…

  11. Intelligent Technologies in Library and Information Service Applications. ASIST Monograph Series.

    Science.gov (United States)

    Lancaster, F. W.; Warner, Amy

    The objective of this study was to gain enough familiarity with developments in artificial intelligence (AI) and related technologies to be able to advise the information service community on what can be applied today and what one might reasonably expect to be applicable to library and information services in the near future. The emphasis is on…

  12. Spanish Faculty Preferences and Usage of Library Services in the Field of Science and Technology

    Science.gov (United States)

    Pinto, Maria; Fernandez-Ramos, Andres

    2010-01-01

    The authors compare Spanish faculty use of library services and the interest they express in value-added services and improvement actions. The results are based on data from a survey of 546 faculty in the field of science and technology. The study differentiates between the areas of pure science, engineering and architecture, and life sciences.…

  13. Information Technology Planning: Computers in the School Library--How Many Are Enough?

    Science.gov (United States)

    Simpson, Carol

    2002-01-01

    Describes the development of a formula to determine the needed quantity of computers for a school library. Four types of information technology activities (administrative, personal productive, class/group productive, online public access catalog) and several variables (age levels served, campus focus, number of staff, size of student body, average…

  14. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... FURTHER INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate...

  15. DNA-encoded libraries - an efficient small molecule discovery technology for the biomedical sciences.

    Science.gov (United States)

    Kunig, Verena; Potowski, Marco; Gohla, Anne; Brunschweiger, Andreas

    2018-06-27

    DNA-encoded compound libraries are a highly attractive technology for the discovery of small molecule protein ligands. These compound collections consist of small molecules covalently connected to individual DNA sequences carrying readable information about the compound structure. DNA-tagging allows for efficient synthesis, handling and interrogation of vast numbers of chemically synthesized, drug-like compounds. They are screened on proteins by an efficient, generic assay based on Darwinian principles of selection. To date, selection of DNA-encoded libraries allowed for the identification of numerous bioactive compounds. Some of these compounds uncovered hitherto unknown allosteric binding sites on target proteins; several compounds proved their value as chemical biology probes unraveling complex biology; and the first examples of clinical candidates that trace their ancestry to a DNA-encoded library were reported. Thus, DNA-encoded libraries proved their value for the biomedical sciences as a generic technology for the identification of bioactive drug-like molecules numerous times. However, large scale experiments showed that even the selection of billions of compounds failed to deliver bioactive compounds for the majority of proteins in an unbiased panel of target proteins. This raises the question of compound library design.

  16. Use of Information and Communication Technology (ICT) in Collection Development in Scientific and Research Institute Libraries in Iran: A study

    Science.gov (United States)

    Khademizadeh, Shahnaz

    2012-08-01

    The explosion of information communication technology (ICT) since the beginning of the 20th century has been rendering manual-based library system in academic, research, special and public libraries less relevant. This is because using and implementing information communication technology in the library depend largely on the librarian attitude toward the current digital age. This study examined the attitudinal correlates of some selected scientific and research institutes libraries in Irantowards the use and application of ICT in their various libraries. A total of ten libraries from all the forty nine libraries in Iran formed the studyís population. It is observed that 'Internet/intranet etc' (1046; 67.5%) is the most important source through which the users become aware of modern information technologies used in their libraries. The vast majority of the respondents who answered electronic sources make it 'Easier' to gather and use information are (1313; 84.7%). The results indicate that there is a significant relationship between e-environment and collection development (?262.86, p=0.000). Findings further show that all of librarians (9; 100%) opined they feel that ICT application affects the collection development of library. Based on these findings, it is recommended that libraries in the developing countries should consider training those librarians who do not have knowledge of ICT in order to remove the fear and anxiety hindering them from developing good attitude towards the use of ICT in their libraries.

  17. Multimedia Bootcamp: a health sciences library provides basic training to promote faculty technology integration.

    Science.gov (United States)

    Ramsey, Ellen C

    2006-04-25

    Recent research has shown a backlash against the enthusiastic promotion of technological solutions as replacements for traditional educational content delivery. Many institutions, including the University of Virginia, have committed staff and resources to supporting state-of-the-art, showpiece educational technology projects. However, the Claude Moore Health Sciences Library has taken the approach of helping Health Sciences faculty be more comfortable using technology in incremental ways for instruction and research presentations. In July 2004, to raise awareness of self-service multimedia resources for instructional and professional development needs, the Library conducted a "Multimedia Bootcamp" for nine Health Sciences faculty and fellows. Case study. Program stewardship by a single Library faculty member contributed to the delivery of an integrated learning experience. The amount of time required to attend the sessions and complete homework was the maximum fellows had to devote to such pursuits. The benefit of introducing technology unfamiliar to most fellows allowed program instructors to start everyone at the same baseline while not appearing to pass judgment on the technology literacy skills of faculty. The combination of wrapping the program in the trappings of a fellowship and selecting fellows who could commit to a majority of scheduled sessions yielded strong commitment from participants as evidenced by high attendance and a 100% rate of assignment completion. Response rates to follow-up evaluation requests, as well as continued use of Media Studio resources and Library expertise for projects begun or conceived during Bootcamp, bode well for the long-term success of this program. An incremental approach to integrating technology with current practices in instruction and presentation provided a supportive yet energizing environment for Health Sciences faculty. Keys to this program were its faculty focus, traditional hands-on instruction, unrestricted

  18. The use of mobile technology in health libraries: a summary of a UK-based survey.

    Science.gov (United States)

    Chamberlain, David; Elcock, Martin; Puligari, Preeti

    2015-12-01

    Health libraries have changed over the past fifteen years in the format of the information they provide. This is driven by developments in technology. To conduct a survey of NHS health libraries in the United Kingdom in order to summarise how mobile technologies are being used, how they are promoted and how they are delivered, highlighting good practice and solutions to issues. An online survey was carried out in 2013 and sent to academic and NHS web-based discussion lists. There were 199 responses. Main replies were from large Acute Hospital Trusts. Only 18% of respondents had conducted research into use of mobile technology (MT) within their Trust. Forty per cent of Trusts offered clinical point of care tools, 29% mobile catalogues, and 30% had mobile enabled web sites. Libraries utilised third-party partnerships rather than develop their own applications or tools. Seventy per cent of Trusts promoted new MT services via e-mail. Network restrictions were the main barrier to development as well as finance and expertise. Uptake and development of MT is sporadic and driven by individuals. There is an opportunity for collaboration and sharing resources and expertise. There are benefits to adopting user-friendly resources. © 2015 Health Libraries Group.

  19. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  20. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  1. Nuclear science, technology and innovation in Canada - securing the future

    Energy Technology Data Exchange (ETDEWEB)

    Walker, R.S. [Atomic Energy of Canada Limited, Chalk River, ON (Canada)

    2014-07-01

    As a Tier 1 Nuclear Nation, Canada has a rich and proud history of achievement in nuclear Science, Technology and Innovation (ST&I) -- from commercializing the CANDU power system around the world, advancing fuel technology and nuclear safety, to protecting human health through nuclear medicine and cancer therapy technology. Today, the nuclear industry in Canada is actively working to secure its promising, long-term place in the world and is embracing the change necessary to fulfill the enormous potential for good of nuclear technology. For its part, the Canadian Government is taking a bold new public policy approach to nuclear ST&I, by restructuring its large, multi-faceted AECL Nuclear Laboratories. Through the restructuring, AECL, as Canada's premier nuclear science and technology organization, will be better positioned for success via an incentivized 'Government-owned-Contractor-operated', private-sector management model. The aim of this new approach is to enhance and grow high-value nuclear innovation for the marketplace, strengthen the competitiveness of Canada's nuclear sector, and reduce costs to the Government of Canada with time. This approach will play a key role in ensuring a bright future for the Canadian Nuclear Industry domestically and globally as it launches its 25-year Vision and Action Plan, where one of the priority action areas is support for a strong, forward-looking, nuclear ST&I agenda. As the new model for the Nuclear Laboratories is moved forward by the Government, with the support of AECL and industry, Canada's nuclear expertise and knowledge continue to be expanded and deepened through the work of the Laboratories' ten Centres of Excellence, where AECL's fundamental approach is guided by the reality that ST&I is needed in all aspects of the nuclear cycle, including decommissioning, waste management and environmental protection. (author)

  2. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  3. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  4. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  5. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  6. Privacy and Security within Biobanking: The Role of Information Technology.

    Science.gov (United States)

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source. © 2016 American Society of Law, Medicine & Ethics.

  7. Science and technology and their implications for peace and security

    International Nuclear Information System (INIS)

    1990-01-01

    The issue of scientific and technological developments in relation to international peace and security has recently attracted a great deal of interest in the international community, due partly to their enormous potential for the well-being of humanity and also to their enormous implications for instability in the world, an instability characterized as the 'quantitative arms race'. There is a growing concern that, in parallel with 'quantitative disarmament' between the major Powers and the East and West Europe, a new rivalry might develop and extend to the quantitative improvement of weapons, with world-wide consequences. The General Assembly of United Nations has considered this problem and adopted several resolutions on the matter. There has been a great deal of interest in the continuation of international dialogue on the subject

  8. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  9. INTERNET SECURITYTECHNOLOGY AND SOCIAL AWARENESS OF THE DANGERS

    Directory of Open Access Journals (Sweden)

    Laskowski Piotr Paweł

    2017-06-01

    Full Text Available The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces the risk of data loss or identity theft. Public awareness of threats continues to grow, but there are also new, previously unknown threats; that is why it is so important to inform of the dangers by all available channels of communication.

  10. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  11. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon; Lee, Sang Heon

    2012-01-01

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  12. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  13. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  14. Extending the Technological, Discursive, and Rhetorical Horizons of Academic Research Libraries' Information Architectures: An Analysis of North Carolina State University's James B. Hunt Jr. Library

    Science.gov (United States)

    Carr, Patrick L.

    2017-01-01

    This dissertation analyzes how North Carolina State University's (NCSU) James B. Hunt Jr. Library extends the ways in which the information architectures of academic research libraries can function as a technology, as discourse, and as rhetoric. The starting point for the analysis is the libraries of antiquity, which functioned technologically as…

  15. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  16. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  17. CERN Central Library : 2000 year old technology transfer. Two fragments of columns from a Roman building discovered during excavations for the PS in 1956 have prominent places in the Library where they can be enjoyed by all

    CERN Multimedia

    Laurent Guiraud

    2001-01-01

    CERN Central Library : 2000 year old technology transfer. Two fragments of columns from a Roman building discovered during excavations for the PS in 1956 have prominent places in the Library where they can be enjoyed by all

  18. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  19. Rights management technologies: A good choice for securing electronic healthrecords?

    NARCIS (Netherlands)

    Petkovic, M.; Katzenbeisser, S.; Kursawe, K.; Pohlmann, N.; Reimer, H.; Schneider, W.

    2007-01-01

    Advances in healthcare IT bring new concerns with respect to privacy and security. Security critical patient data no longer resides on mainframes physically isolated within an organization, where physical security measures can be taken to defend the data and the system. Modern solutions are heading

  20. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  1. User Characteristics、User Involvement and Technology Acceptance in Library Automation System Usage

    Directory of Open Access Journals (Sweden)

    Piching Chu

    2002-12-01

    Full Text Available This paper looks into the relationship of user characteristics, user involvement and technology acceptance, also try to find the relationship of the above three variables and library automation system usage. By interview and questionnaire study, the results are described, according to the analysis of the relative literature and the main conclusions, the researcher offers some suggestions for improving the system usage.[Article content in Chinese

  2. Scanning technology with multi-slice helical CT in security inspection domain

    International Nuclear Information System (INIS)

    Wang Jue; Wang Fuquan; Jiang Zenghui

    2008-01-01

    The paper analyzes the technology conditions of security inspection in home and abroad, and expatiates technology of spiral CT and how to define CT value etc, with studying on the key technology of spiral CT scanning way (X-RAY, detector, technology of pulley etc) and mutual relation. By comparing the present products of security inspection, the conclusion was drawn that it is inevitable to develop the tendency of security inspection area with the checking and discerning the substance by using the technology of multi-layer spiral CT. (authors)

  3. A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies

    OpenAIRE

    Reddy, G. Nikhita; Reddy, G. J. Ugander

    2014-01-01

    Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper ma...

  4. Debunking the Computer Science Digital Library: Lessons Learned in Collection Development at Seneca College of Applied Arts & Technology

    Science.gov (United States)

    Buczynski, James Andrew

    2005-01-01

    Developing a library collection to support the curriculum of Canada's largest computer studies school has debunked many myths about collecting computer science and technology information resources. Computer science students are among the heaviest print book and e-book users in the library. Circulation statistics indicate that the demand for print…

  5. Library Technology and Architecture; Report of a Conference Held at the Harvard Graduate School of Education, February 9, 1967.

    Science.gov (United States)

    Harvard Univ., Cambridge, MA. Graduate School of Education.

    The purpose of the conference was to investigate the implications of new technologies for library architecture and to use the findings in planning new Library Research Facility for the Harvard Graduate School of Education. The first half of this document consists of reports prepared by six consultants on such topics as microforms, computers,…

  6. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  7. Technology News; Distance Education Project: Extending Extension Programming via Telecommunications Technology; [and] Fax for Library Services.

    Science.gov (United States)

    Coyle, Larry; Spitzer, Kathleen L.

    1992-01-01

    Three articles discuss (1) the numbers of microcomputers installed in elementary and secondary schools; (2) a distance education project in the Minnesota Extension Service that used a satellite delivery system and integrated it with a computer information network; and (3) the use of facsimile machines for library services. (LRW)

  8. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  9. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  10. A Security Mechanism for library management system using low cost RFID tags

    Directory of Open Access Journals (Sweden)

    V. Nagalakshmi

    2007-02-01

    Full Text Available Radio Frequency Identification (RFID systems will become pervasive in our daily lives due to their low cost and easy to use characteristics[1]. This paper presents a methodology of using low cost RFID tags for a library management system to protect the books from unauthorized capturing and usage. Every object to be identified in the RFID system is physically labeled with a tag. In the proposed method a book or a magazine or a CD is identified with the RFID tag. Whenever a book is issued to any user of the library, the RFID reader will capture the information of that book and compares it with the related information of the book in the Online Public Access Catalogue (OPAC and issues the book to the user depending on his identity in the database. If any unauthorized person intends to take the book the RFID reader will immediately respond to that and make sure that it was not issued. If any body tries to remove the tag it can be traced with the help of location device. Keywords: RFID, OPAC, Unauthorized user, tag, Reader.

  11. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  12. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  13. A Sustainable Technology Contribuiting to the Food Security

    Directory of Open Access Journals (Sweden)

    Dra. Rosa Catalina Bermúdez-Savòn

    2015-11-01

    Full Text Available A sustainable way for food and energetic security in rural and the city regions, is presented with the application of the solid state fermentation for the biotransformation of lignocellulosic by-products and agro-industrial wastes with white-rot fungi. Inamush as advantages of this technology, is showed the cultivation of mushroom Pleurotus spp.on coffee pulp, cedar chip , coconut and cocoa shells, and the influence of it´s mixture (1:1, trough examination of their growth rates and conversion efficacy to fruiting bodies, which cause contamination of soil and water, because of large volumes and difficult management. The use of residues for these cultive was consolidate such as alternative viable for food production, capable to satisfy the protein and nutritive necessity of population in the non-developing countries, besides low cost production, high protein content and obtention in large quantity in short time. In addition to produce complements for animal feet, such as the spent oyster mushroom substrate postcosecha is detoxified, has proteic content and better digestibility than original substrates,and can be used as animal feed or fertilizer, at the same time, was eradicated the problem of environmental contamination of these residues provoking and further contribution at sustainable development of the communities.

  14. Nuclear material facilities - security systems and technology R and D trends

    International Nuclear Information System (INIS)

    Ellis, D.; Steele, B.

    2002-01-01

    Full text: In the US, physical security research and development (R and D) during the 1970s and 1980s created a body of technology and systems engineering that largely defined the industry for several decades. However, despite today's terrorists threats and risks, the overall funding of new and innovative physical security solutions is relatively very small. Such factors constraining physical security R and D include the expansion of overall security responsibilities, the emphasis on programmatic and business performance, in addition to evolving (mis)perceptions that 'the problem has been solved' or that 'anyone can do security'. Underlying these factors, the lack of robust standards and certifications has limited the development and application of physical security products, systems, and services. The research and development of new security technologies must be evaluated against very demanding constraints - including costs/benefits, emerging threats, and policies. Going forward, the goal will be to create a more comprehensive approach to physical security of nuclear material facilities that matches evolving threats and that will complement the transition to an integrated security/operations management environment. Such a management model evaluates the additional value of increasing security alternatives in addition to determining trade-offs between the programmatic mission and security issues. Correspondingly, more explicit and strategically useful measures must be developed to determine importance that, in turn, will influence security-related R and D efforts. The research and development of security technologies should be based upon identified needs and requirements resulting from a systematic analysis of the threat and other conditions. In particular, security technologies and systems must be evaluated in terms of current and long-term impacts. Such needs are (will be) diverse and will depend upon sustained research investments in a broad range of technologies

  15. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  16. Discovery of Potent and Selective Inhibitors for ADAMTS-4 through DNA-Encoded Library Technology (ELT).

    Science.gov (United States)

    Ding, Yun; O'Keefe, Heather; DeLorey, Jennifer L; Israel, David I; Messer, Jeffrey A; Chiu, Cynthia H; Skinner, Steven R; Matico, Rosalie E; Murray-Thompson, Monique F; Li, Fan; Clark, Matthew A; Cuozzo, John W; Arico-Muendel, Christopher; Morgan, Barry A

    2015-08-13

    The aggrecan degrading metalloprotease ADAMTS-4 has been identified as a novel therapeutic target for osteoarthritis. Here, we use DNA-encoded Library Technology (ELT) to identify novel ADAMTS-4 inhibitors from a DNA-encoded triazine library by affinity selection. Structure-activity relationship studies based on the selection information led to the identification of potent and highly selective inhibitors. For example, 4-(((4-(6,7-dimethoxy-3,4-dihydroisoquinolin-2(1H)-yl)-6-(((4-methylpiperazin-1-yl)methyl)amino)-1,3,5-triazin-2-yl)amino)methyl)-N-ethyl-N-(m-tolyl)benzamide has IC50 of 10 nM against ADAMTS-4, with >1000-fold selectivity over ADAMT-5, MMP-13, TACE, and ADAMTS-13. These inhibitors have no obvious zinc ligand functionality.

  17. Promoter library-based module combination (PLMC) technology for optimization of threonine biosynthesis in Corynebacterium glutamicum.

    Science.gov (United States)

    Wei, Liang; Xu, Ning; Wang, Yiran; Zhou, Wei; Han, Guoqiang; Ma, Yanhe; Liu, Jun

    2018-05-01

    Due to the lack of efficient control elements and tools, the fine-tuning of gene expression in the multi-gene metabolic pathways is still a great challenge for engineering microbial cell factories, especially for the important industrial microorganism Corynebacterium glutamicum. In this study, the promoter library-based module combination (PLMC) technology was developed to efficiently optimize the expression of genes in C. glutamicum. A random promoter library was designed to contain the putative - 10 (NNTANANT) and - 35 (NNGNCN) consensus motifs, and refined through a three-step screening procedure to achieve numerous genetic control elements with different strength levels, including fluorescence-activated cell sorting (FACS) screening, agar plate screening, and 96-well plate screening. Multiple conventional strategies were employed for further precise characterizations of the promoter library, such as real-time quantitative PCR, sodium dodecyl sulfate polyacrylamide gel electrophoresis, FACS analysis, and the lacZ reporter system. These results suggested that the established promoter elements effectively regulated gene expression and showed varying strengths over a wide range. Subsequently, a multi-module combination technology was created based on the efficient promoter elements for combination and optimization of modules in the multi-gene pathways. Using this technology, the threonine biosynthesis pathway was reconstructed and optimized by predictable tuning expression of five modules in C. glutamicum. The threonine titer of the optimized strain was significantly improved to 12.8 g/L, an approximate 6.1-fold higher than that of the control strain. Overall, the PLMC technology presented in this study provides a rapid and effective method for combination and optimization of multi-gene pathways in C. glutamicum.

  18. Advances in cyber security technology, operations, and experiences

    CERN Document Server

    Hsu, D Frank

    2013-01-01

    Advances in Cyber Security provides, in a technical yet easy to understand fashion, a real life story of the evolving cyberspace ecosystem from the perspectives of structure, function, and application. It also provides ways and means to secure and sustain this ecosystem by the collective wisdom of professionals and practitioners from government, academia, and industry across national and international boundaries.

  19. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  20. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  1. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  2. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  3. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  4. New trends in science and technology implications for international peace and security

    International Nuclear Information System (INIS)

    1991-01-01

    In December 1988, the General Assembly requested the Secretary-General to follow future scientific and technological developments, especially those with potential military applications, and to evaluate their impact on international security. In resolution 43/77 A it also requested the Secretary-General to report to it at its forty-fifth session. The broad fields in which scientific and technological developments are taking place were identified as: information technology, biotechnology, materials technology, nuclear technology and space technology. These assessments were discussed by a wider group of experts at a high-level conference on ''New trends in science and technology: implications for international peace and security'', held in April 1990 in the city of Sendai, Japan. The Conference, which was attended by nearly 100 participants from over 20 countries, addressed issues of technological change and global security, new technologies and the search for security in the post-cold-war era, and national policy-making and international diplomacy in an era of rapid technological change. General approaches to technology assessment and technology trends in selected areas were also discussed. The positions taken by Member States on the subject of establishing a mechanism for technology assessment were also taken into account. The highlights of the report are summarized

  5. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  6. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  7. Technology safeguards needed as security rule audits loom.

    Science.gov (United States)

    Gersh, Deborah; Hoey, Laura G; McCrystal, Timothy M; Tolley, David C

    2012-05-01

    The Department of Health and Human Services will conduct security rule audits that will involve on-site visits and include: Compliance-focused interviews with key organizational leaders. Scrutiny of physical operations controls, especially regarding storage, maintenance, and use of protected health information. Assessment of organizational policies and procedures to ensure compliance with privacy and security rules. Identification of regulatory compliance areas of concern.

  8. Security Aspects for Business Solution Development on Portal Technology

    OpenAIRE

    Ovidiu R?DU??; Adrian MUNTEANU

    2012-01-01

    In the scope of portal development, in order to talk about security issues, concerns, and solutions, it is necessary to define a few terms: authentication, authorization, Single Sign-On (SSO), confidentiality, integrity, and non-repudiation. Focusing on the scope of what the portal developer and designer need to know, below it will be explained these concepts, considering it is important to define and make a brief analysis of these terms for understanding of achieving the security goals.

  9. Adaptive security systems -- Combining expert systems with adaptive technologies

    International Nuclear Information System (INIS)

    Argo, P.; Loveland, R.; Anderson, K.

    1997-01-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting

  10. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  11. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  12. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  13. Optical Disk Technology and the Library. Part 1: The Technology and Its Applications. Part 2: The National Library Videodisc Demonstration Project. Canadian Network Papers Number 9 = Technologie du Videodisque et la Bibliotheque. Premiere partie: La Technologie et ses Applications. Deuxieme partie: Projet de Demonstration du Videodisque a la Bibliotheque Nationale. Documents sur les Reseaux Canadiens Numero 9.

    Science.gov (United States)

    Duchesne, Roddy; Sonnemann, Sabine S.

    This report is intended to assist Canadian libraries in assessing potential library applications of optical disk technology. Part 1 provides a general outline of the technology and describes a number of library applications and projects. Descriptions are purposely general and illustrative in nature since the technology and its applications are…

  14. Factors Influencing Adoption of Information Technology Infrastructure Library: Utilizing the Technology Acceptance Model (TAM)

    Science.gov (United States)

    Cox, Din S. Z.

    2013-01-01

    There is a shortage of evidence based research that provides organizations with the necessary information in support of their technology adoption decisions in relation to ITSM technologies. As such, this research study attempted to bridge the gap by offering insight on possible factors that could influence such decisions. An examination of…

  15. Making the most of RFID in libraries

    CERN Document Server

    Palmer, Martin

    2009-01-01

    The advantage of radio frequency identification (RFID) over other technologies used in libraries is usually seen to be its ability to combine the functions of the barcode and the security tag, but with the added advantage of not needing line of sight. This book considers the benefits of installing RFID technology; and work with vendors.

  16. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of... Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY...

  17. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...

  18. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...

  19. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  20. Technology scale and supply chains in a secure, affordable and low carbon energy transition

    International Nuclear Information System (INIS)

    Hoggett, Richard

    2014-01-01

    Highlights: • Energy systems need to decarbonise, provide security and remain affordable. • There is uncertainty over which technologies will best enable this to happen. • A strategy to deal with uncertainty is to assess a technologies ability to show resilience, flexibility and adaptability. • Scale is important and smaller scale technologies are like to display the above characteristics. • Smaller scale technologies are therefore more likely to enable a sustainable, secure, and affordable energy transition. - Abstract: This research explores the relationship between technology scale, energy security and decarbonisation within the UK energy system. There is considerable uncertainty about how best to deliver on these goals for energy policy, but a focus on supply chains and their resilience can provide useful insights into the problems uncertainty causes. Technology scale is central to this, and through an analysis of the supply chains of nuclear power and solar photovoltaics, it is suggested that smaller scale technologies are more likely to support and enable a secure, low carbon energy transition. This is because their supply chains are less complex, show more flexibility and adaptability, and can quickly respond to changes within an energy system, and as such they are more resilient than large scale technologies. These characteristics are likely to become increasingly important in a rapidly changing energy system, and prioritising those technologies that demonstrate resilience, flexibility and adaptability will better enable a transition that is rapid, sustainable, secure and affordable

  1. The Mobile Library and Staff Preparedness: Exploring Staff Competencies Using the Unified Theory of Acceptance and Use of Technology Model

    Science.gov (United States)

    Saravani, Sarah-Jane; Haddow, Gaby

    2011-01-01

    This paper presents preliminary findings of a study investigating the current state of preparedness of staff at institutes of technology and TAFE libraries across Australia and New Zealand in relation to delivering services through mobile technologies. In particular, the skills, knowledge, and competencies of staff in relation to mobile…

  2. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    Science.gov (United States)

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  3. 9th International Bielefeld Conference 2009: Upgrading the eLibrary: Enhanced Information Services Driven by Technology and Economics

    Directory of Open Access Journals (Sweden)

    Almuth Gastinger

    2009-10-01

    Full Text Available Thisarticle reports on the 9th International Bielefeld Conference ‘Upgrading the eLibrary: Enhanced Information Services Driven by Technology and Economics’, 3-5 February 2009, in Bielefeld, Germany. The conference focused on future challenges for libraries regarding the development of information services and infrastructures that meet the changing needs of scholarly communication, collaboration (e-science and publication (open access as well as new requirements regarding teaching and learning (virtual learning spaces. In addition attention was paid to economic conditions and strategic positioning of libraries as a general framework for information services.

  4. The Effects of Information Technology on Library and Documentation Centers: A Review of Social, Structural, Managerial and Functional Aspects

    Directory of Open Access Journals (Sweden)

    Mesut Kurulgan

    2013-11-01

    Full Text Available In the context of protecting academic and cultural heritage, the purpose of libraries and information and documentation centers is to research, document, and archive and to transfer to future generations, domestically and internationally, a society ’s culture. This study examines the structural, functional and administrative innovations that have resulted from the implementation of information technology (IT in libraries since the 1990 ’s. The study also mentions how IT can be used in an efficient way in libraries and information and documentation centers.

  5. Discovery of a Potent Class of PI3Kα Inhibitors with Unique Binding Mode via Encoded Library Technology (ELT).

    Science.gov (United States)

    Yang, Hongfang; Medeiros, Patricia F; Raha, Kaushik; Elkins, Patricia; Lind, Kenneth E; Lehr, Ruth; Adams, Nicholas D; Burgess, Joelle L; Schmidt, Stanley J; Knight, Steven D; Auger, Kurt R; Schaber, Michael D; Franklin, G Joseph; Ding, Yun; DeLorey, Jennifer L; Centrella, Paolo A; Mataruse, Sibongile; Skinner, Steven R; Clark, Matthew A; Cuozzo, John W; Evindar, Ghotas

    2015-05-14

    In the search of PI3K p110α wild type and H1047R mutant selective small molecule leads, an encoded library technology (ELT) campaign against the desired target proteins was performed which led to the discovery of a selective chemotype for PI3K isoforms from a three-cycle DNA encoded library. An X-ray crystal structure of a representative inhibitor from this chemotype demonstrated a unique binding mode in the p110α protein.

  6. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  7. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  8. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  9. Technological Advances Impacting Libraries and Libraries of the Future Kütüphaneleri Etkileyen Teknolojik Yenilikler ve Geleceğin Kütüphaneleri

    Directory of Open Access Journals (Sweden)

    Nazan Özenç Uçak

    1995-03-01

    Full Text Available Developments in libraries which began with the use of computers accelerate with the emergence of new technologies every day. Especially, the widespread use of microcomputers, developments in communication and optic disk technologies, and the use ofartifxcal intelligence and expert systems in libraries have impact upon the library profession. The assortment, quality and speed of library services have increased due to these developments. Along with the technological advances, the organizational structure of , and the management approcah to, libraries changes, too. These ongoing changes bring forth the question of what would happen to the libraries and librarianship of the future. Kütüphanelerde bilgisayarların kullanımı ile başlayan gelişmeler, her geçen gün yeni teknolojilerin ortaya çıkmasıyla giderek büyümektedir, özellikle mikrobilgisayarların geniş kullanım alanı bulması, iletişim teknolojisinin hızlı gelişimi, optik disk teknolojisindeki yenilikler, yapay zeka ve uzman sistemlerden kütüphanecilik alanında yararlanılabilmesi kütüphanecilik mesleğini etkilemektedir. Bu gelişmelere bağlı olarak verilen hizmetlerin çeşidi, niteliği ve hızı artmaktadır. Kütüphanelerin Örgüt yapılarında, yönetim anlayışlarında da değişimler söz konusudur. Bugün yaşanan bu değişimler geleceğin kütüphanelerinin ve kütüphaneciliğinin neolacağı sorularını gündeme getirmektedir.

  10. Utilization of Information and Communication Technology (ICT) Resources and Job Effectiveness among Library Staff in the University of Calabar and Cross River University of Technology, Nigeria

    Science.gov (United States)

    Ntui, Aniebiet Inyang; Inyang, Comfort Linus

    2015-01-01

    This study investigated utilization of Information and Communication Technology (ICT) resources and job effectiveness among library staff in the University of Calabar and Cross River University of Technology, Nigeria. To achieve the purpose of this study, four hypotheses were formulated to guide the study. Ex-post facto research design was adopted…

  11. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Brown, G.E. Jr.

    1990-01-01

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world's inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  12. New technologies and the search for security: Prospects for a post-cold-war era

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Jr, G E

    1991-12-31

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world`s inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  13. Evaluation methodologies for security testing biometric systems beyond technological evaluation

    OpenAIRE

    Fernández Saavedra, María Belén

    2013-01-01

    The main objective of this PhD Thesis is the specification of formal evaluation methodologies for testing the security level achieved by biometric systems when these are working under specific contour conditions. This analysis is conducted through the calculation of the basic technical biometric system performance and its possible variations. To that end, the next two relevant contributions have been developed. The first contribution is the definition of two independent biometric performance ...

  14. Japanese Technology and U.S. National Security

    Science.gov (United States)

    1990-12-01

    Japanese penchant for situational ethics allowed a sharp psychological about-face following the war, enabling them to accept the American policies. Power...Reagan/Bush Administrations have exaggerated the nation’s defense needs and that selfish interests are overriding objectivity and common sense in the ...security.195 They view the United States as having benign political motives and having the largest domestic market needed to develop regional

  15. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A.H.M Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  16. Using automatic identification system technology to improve maritime border security

    OpenAIRE

    Lindstrom, Tedric R.

    2014-01-01

    Approved for public release; distribution is unlimited Our coastal waters are the United States’ most open and vulnerable borders. This vast maritime domain harbors critical threats from terrorism, criminal activities, and natural disasters. Maritime borders pose significant security challenges, as nefarious entities have used small boats to conduct illegal activities for years, and they continue to do so today. Illegal drugs, money, weapons, and migrants flow both directions across our ma...

  17. Sharing of information and knowledge among staff in King Abdullah University of Science and Technology (KAUST) library

    KAUST Repository

    Ramli, Rindra M.

    2011-03-01

    This paper describes strategies and initiatives undertaken by the King Abdullah University of Science and Technology (KAUST) library in sharing information and knowledge among its staff. KAUST Library adopted several IT platforms to enable staff to contribute, share, collaborate, extract and act upon knowledge in order to serve our users better. They include: Sharepoint and Google Docs. As Duffy (2000) stated, that “success depends on capitalizing on every available resource including what a company knows and how it uses what it knows”. Therefore, to provide value-added services to our community of researchers and academicians, library staff needs to be equipped with the right skills and tools to be able to act upon users’ inquiries and information needs. KAUST library which was opened in Aug 2009 aims to support education and advanced scientific research. With its state of the art learning and information resource center, the library provides instructional assistance and reference services to its research and academic community. With the influx of information coupled the pervasive use of information technology and Web2.0, the library has to grapple with the issue of information overload. It is important to be able to sieve through the rubbles of information to apply the relevant ones during the point of transaction. Based on our experience in using various IT platforms, this paper will share the impacts of such tools. Lessons learnt and future directions in this area will also be discussed.

  18. The Role of Agricultural Technology in Food and Nutritional Security ...

    African Journals Online (AJOL)

    Strengthening of agricultural research and extension. The development and utilization of profitable and environmentally-friendly technology is an essential factor for the transformation of agriculture into a modern sector. The impact of technology can be attained through the revitalization of agricultural research and extension ...

  19. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    Science.gov (United States)

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  20. How Safe Are Our Libraries?

    Science.gov (United States)

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  1. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  2. Adapting Digital Libraries to Continual Evolution

    Science.gov (United States)

    Barkstrom, Bruce R.; Finch, Melinda; Ferebee, Michelle; Mackey, Calvin

    2002-01-01

    In this paper, we describe five investment streams (data storage infrastructure, knowledge management, data production control, data transport and security, and personnel skill mix) that need to be balanced against short-term operating demands in order to maximize the probability of long-term viability of a digital library. Because of the rapid pace of information technology change, a digital library cannot be a static institution. Rather, it has to become a flexible organization adapted to continuous evolution of its infrastructure.

  3. Analysis of the Technology New Media Operation Mode and Its Enlightenment to Library Mobile Knowledge Service Platforms

    Directory of Open Access Journals (Sweden)

    Wang Junyu

    2017-12-01

    Full Text Available [Purpose/significance] Technology new media are the products of the combination of the technological information and new media communication tools. The innovation of contents, models and carriers are worth all kinds of knowledge service platforms’ reference. [Method/process] This paper selected the top ten new media of “Chinese Technology New Media Ranking in 2016” and combed the contents, communication channels, online and offline activities and profit models of the top ten media to analyze the characteristics of technology new media and the existing problems. [Result/conclusion] Library mobile knowledge service platforms should learn from these technology new media. In the future, library mobile knowledge service platforms should attract more users to take part in contributing knowledge on the basis of ensuring the content quality and form a model of information dissemination, online services and offline activities to make their own market competitiveness.

  4. Security of OS-level virtualization technologies: Technical report

    OpenAIRE

    Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.

    2014-01-01

    The need for flexible, low-overhead virtualization is evident on many fronts ranging from high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study of OS-level virtualization from the point of view of security. In this report, we conduct a comparative study of several OS-level v...

  5. Finding the right technology solutions to secure our borders

    CSIR Research Space (South Africa)

    Venter, CP

    2015-10-01

    Full Text Available technologies used • Radar and Electronic warfare systems, optronic systems, unmanned aerial vehicles, databases, software, networks. • Preparation time 8 months • Executed over two weeks Working with real results After the experiment • Overall...

  6. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  7. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  8. Microsoft Technology as an Optimization Tool in Promoting Security and Functionality of the Educational System

    Directory of Open Access Journals (Sweden)

    Jelena Jardas Antonic

    2008-10-01

    Full Text Available Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and security situation of information infrastructure has been initiated in 24 schools in the authority of the city. Having completed the multicriteria analysis of the collected data, we have built a model of implementing Microsoft service technologies. The implementation should satisfy the elementary security principles that are required by the security standards today, maximizing functionality of infrastructure and minimizing network administration tasks. Server technology that has been used in this solution is Microsoft Widows 2003 Server R2 and Internet Security and Acceleration Server 2006, as well as the GFI WebMonitor and antivirus.

  9. Designing Mobile Technology to Enhance Library Space Use: Findings from an Undergraduate Student Competition

    Science.gov (United States)

    Ward, David; Hahn, Jim; Mestre, Lori S.

    2015-01-01

    To explore how libraries might integrate student perspectives and needs into their mobile development workflow, one large academic research library developed a fun, collaborative design methodology in order to stimulate student creativity. As part of a national IMLS (Institute for Museums and Library Services) grant, "The Student/Library…

  10. Historic Buildings and Modern Technology: The California State Library Remodels for Automation--A Case Study.

    Science.gov (United States)

    Hudson, Kathy

    1987-01-01

    Provides background on the California State Library, a description of the Library and Courts Building, and a summary of automation objectives. Concerns in renovation to accommodate a modern library are then discussed: (1) environment; (2) electrical and telephone circuitry; (3) data and voice communications; (4) physical factors; and (5)…

  11. Using Mobile Technology to Observe Student Study Behaviors and Track Library Space Usage

    Science.gov (United States)

    Thompson, Susan

    2015-01-01

    Libraries have become increasingly interested in studying the use of spaces within their buildings. Traditional methods for tracking library building use, such as gate counts, provide little information on what patrons do once they are in the library; therefore, new methods for studying space usage are being developed. Particularly promising are…

  12. Nuclear data, cross section libraries and their application in nuclear technology

    International Nuclear Information System (INIS)

    1985-01-01

    These proceedings contain the articles presented at the named seminar. The articles deal with evaluated nuclear data libraries, computer codes for neutron transport and reactor calculations using nuclear data libraries, and the application of nuclear data libraries for the calculation of the interaction of neutron beams with materials. (HSI)

  13. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  14. MUSES RT2AE V P/DP: On the Road to Privacy-Friendly Security Technologies in the Workplace

    OpenAIRE

    Van Der Sype, Yung Shin Marleen; Guislain, Jonathan; Seigneur, Jean-Marc; Titi, Xavier

    2016-01-01

    Successful protection of company data assets requires strong technological support. As many security incidents still occur from within, security technologies often include elements to monitor the behaviour of employees. As those security systems are considered as privacy-intrusive, they are hard to align with the privacy and data protection rights of the employees of the company. Even though there is currently no legal obligation for developers to embed privacy and data protection in security...

  15. Use of Persuasive Technology to Change End-Users- IT Security Aware Behaviour: A Pilot Study

    OpenAIRE

    Ai Cheo Yeo; Md. Mahbubur Rahim; Yin Ying Ren

    2008-01-01

    Persuasive technology has been applied in marketing, health, environmental conservation, safety and other domains and is found to be quite effective in changing people-s attitude and behaviours. This research extends the application domains of persuasive technology to information security awareness and uses a theory-driven approach to evaluate the effectiveness of a web-based program developed based on the principles of persuasive technology to improve the information sec...

  16. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  17. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  18. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  19. Applications of ultra-compact accelerator technologies for homeland security

    International Nuclear Information System (INIS)

    Sampayan, S.; Caporaso, G.; Chen, Y.J.; Falabella, S.; Guethlein, G.; Harris, J.R.; Hawkins, S.; Holmes, C.; Krogh, M.; Nelson, S.; Nunnally, W.; Paul, A.C.; Poole, B.; Rhodes, M.; Sanders, D.; Selenes, K.; Shaklee, K.; Sitaraman, S.; Sullivan, J.; Wang, L.; Watson, J.

    2007-01-01

    We report on a technology development to address explosive detector system throughout with increased detection probability. The system we proposed and are studying consists of a pixelized X-ray based pre-screener and a pulsed neutron source quantitative post verifier. Both technologies are derived from our compact accelerator development program for the Department of Energy Radiography Mission that enables gradients >10MV/m. For the pixelized X-ray source panel technology, we have performed initial integration and testing. For the accelerator, we are presently integrating and testing cell modules. For the verifier, we performed MCNP calculations that show good detectability of military and multi-part liquid threat systems. We detail the progress of our overall effort, including research and modeling to date, recent high voltage test results and concept integration

  20. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  1. Challenges of Information Technology Security in the NASA Environment

    Science.gov (United States)

    Santiago, S. S.

    2000-01-01

    A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.

  2. Technology adoption and food security: the role of the Nigerian ...

    African Journals Online (AJOL)

    The focus of this paper is on the potential role of the Nigerian Agricultural Insurance Scheme (NAIS) in protecting the farmer from the plethora of risks associated with the transfer and introduction of modern technologies. The scheme can improve farmers' access to credit when the insurance contract is used as collateral for ...

  3. MIT Lincoln Laboratory: Technology in Support of National Security

    Science.gov (United States)

    2011-01-01

    technologies that could be uti - lized in future Landsat satellites to achieve significant economies of mass, size, power consumption, and cost, and...epitomized by the pregnancy test kit. However, immunoassays are typically based on anti bodies removed from their host cells and placed on substrates

  4. Newer Technologies for School Security. ERIC Digest Number 145.

    Science.gov (United States)

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  5. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  6. Agricultural extension, technology adoption and household food security

    NARCIS (Netherlands)

    Santos Rocha, Jozimo

    2017-01-01

    In this thesis, I use experimental and quasi-experimental data from 25 villages and a total of 1,105 farmers from eastern DRC to investigate the relationship among agricultural training, the adoption of agricultural technologies, crop productivity, and household food insecurity and dietary

  7. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  8. academic libraries

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management

    Information Impact: Journal of Information and Knowledge Management ... Key words: academic libraries, open access, research, researchers, technology ... European commission (2012) reports that affordable and easy access to the results ...

  9. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  10. The role of an academic library in research: researchers’ perspectives at a South African University of Technology

    Directory of Open Access Journals (Sweden)

    Genevieve Hart

    2011-01-01

    Full Text Available Academic libraries typically identify research support as a central pillar in their mission. But they need to examine how their mission statements relate to the perspectives of researchers themselves, especially in view of reported changes in researchers’ information seeking and sharing in the online environment. By means of a questionnaire survey of 102 full time academic staff at the Cape Peninsula University of Technology, the project examined how researchers use their institution’s library in their research and what their expectations are. For various historical reasons universities of technology lag behind in terms of their research output and in recent years CPUT has prioritised research. This is reflected in the virtual unanimity among the 102 respondents that research is essential to their job despite their heavy teaching loads. Overall, the study finds that most (over 65% continue to rely on the library for access to print and electronic resources. It finds a heavy emphasis on the traditional functions of an academic library, such as resource and information management. A few gaps emerge between the delivery of library services and researchers’ desires. For example, very few attend the library’s scheduled database training workshops; yet most see database training as one of the library’s key contributions to research. The most pressing desire is to be kept informed of new research in their fields; yet only a minority experience this level of service and less than half express confidence in the discipline knowledge of librarians.

  11. How Secure Is Education in Information Technology? A Method for Evaluating Security Education in IT

    Science.gov (United States)

    Grover, Mark; Reinicke, Bryan; Cummings, Jeff

    2016-01-01

    As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…

  12. Creating Tomorrow's Technologists: Contrasting Information Technology Curriculum in North American Library and Information Science Graduate Programs against Code4lib Job Listings

    Science.gov (United States)

    Maceli, Monica

    2015-01-01

    This research study explores technology-related course offerings in ALA-accredited library and information science (LIS) graduate programs in North America. These data are juxtaposed against a text analysis of several thousand LIS-specific technology job listings from the Code4lib jobs website. Starting in 2003, as a popular library technology…

  13. Assistive Technologies and Issues Relating to Privacy, Ethics and Security

    Science.gov (United States)

    Martin, Suzanne; Bengtsson, Johan E.; Dröes, Rose-Marie

    Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.

  14. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S.

    2009-11-01

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report

  15. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S

    2009-11-15

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report.

  16. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  17. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  18. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  19. Technologies for security, military police, and professional policing organizations: the Department of Energy perspective

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    There are many emerging technologies that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: scannerless laser radar; next generation security systems; response force video information helmet system; access delay technologies; rapidly deployable intrusion detection systems; cost risk benefit analysis.

  20. About Place and Role of Information and Communication Technologies, Information Security at the Present Stage

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-12-01

    Full Text Available In the present article author considers questions of importance of information and communication technologies in modern information society and about information security. In the course of the research the author analyzes opinions both known Russian, and famous foreign scientists and practicians from various countries of the world (Italy, the USA, Portugal, etc.. Author emphasizes importance of information and communication technologies at the present stage of development of society and state.

  1. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  2. Differential screening of phage-ab libraries by oligonucleotide microarray technology.

    Directory of Open Access Journals (Sweden)

    Paolo Monaci

    Full Text Available A novel and efficient tagArray technology was developed that allows rapid identification of antibodies which bind to receptors with a specific expression profile, in the absence of biological information. This method is based on the cloning of a specific, short nucleotide sequence (tag in the phagemid coding for each phage-displayed antibody fragment (phage-Ab present in a library. In order to set up and validate the method we identified about 10,000 different phage-Abs binding to receptors expressed in their native form on the cell surface (10 k Membranome collection and tagged each individual phage-Ab. The frequency of each phage-Ab in a given population can at this point be inferred by measuring the frequency of its associated tag sequence through standard DNA hybridization methods. Using tiny amounts of biological samples we identified phage-Abs binding to receptors preferentially expressed on primary tumor cells rather than on cells obtained from matched normal tissues. These antibodies inhibited cell proliferation in vitro and tumor development in vivo, thus representing therapeutic lead candidates.

  3. Shock wave science and technology reference library. Vol. 4. Heterogeneous detonation

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Fan (ed.) [Defence Research and Development Canada, Suffield, AB (Canada)

    2009-07-01

    This book, as a volume of the Shock Wave Science and Technology Reference Library, is primarily concerned with detonation waves or compression shock waves in reactive heterogeneous media, including mixtures of solid, liquid and gas phases. The topics involve a variety of energy release and control processes in such media - a contemporary research field that has found wide applications in propulsion and power, hazard prevention as well as military engineering. The six extensive chapters contained in this volume are: - Spray Detonation (SB Murray and PA Thibault) - Detonation of Gas-Particle Flow (F Zhang) - Slurry Detonation (DL Frost and F Zhang) - Detonation of Metalized Composite Explosives (MF Gogulya and MA Brazhnikov) - Shock-Induced Solid-Solid Reactions and Detonations (YA Gordopolov, SS Batsanov, and VS Trofimov) - Shock Ignition of Particles (SM Frolov and AV Fedorov). Each chapter is self-contained and can be read independently of the others, though, they are thematically interrelated. They offer a timely reference, for graduate students as well as professional scientists and engineers, by laying out the foundations and discussing the latest developments including yet unresolved challenging problems. (orig.)

  4. Risk, security and technology: governing football supporters in the twenty-first century

    NARCIS (Netherlands)

    Spaaij, R.

    2013-01-01

    This paper critically examines the security and risk management technologies that are being used to conduct and pre-empt the behaviour of football supporters. It is shown how, in the Netherlands, pre-emptive risk management in the governing of football supporters involves a dispersed and fragmented

  5. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... basis, the Contractor shall provide to the Contracting Officer verification that the IT-SP remains valid... Contracting Officer verification that the IT-SC&A remains valid. Evidence of a valid system accreditation...

  6. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    Science.gov (United States)

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  7. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ..., DC 20230 (or via the Internet at [email protected] ). FOR FURTHER INFORMATION CONTACT: Requests for... techniques or other forms of information technology. Comments submitted in response to this notice will be... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment...

  8. Mutations technology in the service of food security

    International Nuclear Information System (INIS)

    Sobeih, S.A.S.

    2013-01-01

    Nuclear techniques of various physical mutagens such as, X-rays, Gamma rays, Beta partials, Neutrons, Lasers, Electron beams, Ion beams irradiation and some chemical mutagens had significantly contributed in developing superior crop varieties of seeds and vegetatively propagated crops. Those released mutant cultivars in different groups had great economic impact on agriculture and food production and added billions of dollars in the economy of many countries. More than 3200 crops varieties of different crops have been officially released by mutation breeding technique. Almost half (48%) of all mutant crop varieties is recorded in cereals. Rice is the crop with the highest number of mutants and accounts for (53%) of the mutant cereals under cultivations followed by barley which makes up (20%) of all cereals mutant varieties globally. More than half (60%) of the mutants crop varieties have been released in Asia. China alone accounts for more than(25%) of all mutant varieties that have been officially released globally. Nuclear technology is an important way to reduce the gap of food between consumption and climate change and on the other hand to increase production. (author)

  9. Combining technologies - radiography and neutron based - for cargo security applications

    International Nuclear Information System (INIS)

    Gozani, T.; Liu, F.; Sivakumar, M.; Brown, D.

    2004-01-01

    Inspection of air and sea cargo has traditionally been done by X-ray systems of various energies relying on operators to analyze images looking for anomalies in the image of cargo that may signify a threat. This has shown only limited success in detecting explosives and other threats, which do not have any distinctive shapes. OSI Systems, through its subsidiaries Rapiscan and Ancore, has combined high-energy x-ray radiography with thermal neutron analysis (TNA) to create the combined system-''TNX''. The system provides automatic material specific detection of bulk threat items, like explosives, while furnishing the operator with a high-resolution image for weapons detection and also to identify anomalies for the TNA to inspect. Similarly the Pulsed Fast Neutron Analysis (PFNA) can be combined with high-energy x-ray to create a ''FNX'' system for both air and sea cargo applications. This enables the operator obtain a three dimensional image of the material composition of the cargo under inspection and remove the clutter from the image leaving only the potentially hazardous material(s) automatically while viewing a high resolution image for manifest verification and weapons. The current status of the technology will be discussed and data be presented

  10. Who Moved My Intranet? The Human Side of Introducing Collaborative Technologies to Library Staff

    Science.gov (United States)

    Jeffery, Keven; Dworak, Ellie

    2010-01-01

    Intranets can be crucial tools in fostering communication within an academic library. This article describes the successful implementation of an intranet wiki at the San Diego State University Library & Information Access. The steps involved with implementing, marketing, and supporting the MediaWiki software are described, and the results of a…

  11. Food Security, Institutional Framework and Technology: Examining the Nexus in Nigeria Using ARDL Approach.

    Science.gov (United States)

    Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese

    2018-04-01

    Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture.

  12. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  13. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    Stockmann, Xiao Qiang. Changing Media, Changing China , New York: Oxford University Press, (01 2011) Dieter Ernst. Indigenous Innovation and...2211 China , science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...ABSTRACT Final Report: The Evolving Relationship Between Technology and National Security in China : Innovation , Defense Transformation, and China’s

  14. Arms and technology transfers: Security and economic considerations among importing and exporting states

    International Nuclear Information System (INIS)

    Lodgaard, S.; Pfaltzgraff, R.L. Jr.

    1995-01-01

    The issues of technology and armament transfers are increasingly at the forefront of problems of international security and disarmament. Three major reasons could explain this. First, the disarmament process has been very successful in the last few years, especially in the field of nuclear, as well chemical and conventional, weapons. Second the disarmament effort underway concerns primarily the old partners of the East-West confrontation. Last, the general context, characterized by the opening and widening of exchanges, the increasingly open and transparent circulation of techniques and material, and the globalization of economic relations, must be taken into account. This report, prepared by UNIDIR comprises the following subjects: General trends in defense related transfers; Political/military factors associated with the diffusion of advanced technology; economic and technological consideration; and facilitation of economic growth/maximization of regional security and stability

  15. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  16. Generation and testing of the shielding data library EURLIB for fission and fusion technology

    International Nuclear Information System (INIS)

    Caglioti, E.; Hehn, G.; Herrnberger, V.; Mattes, M.; Nicks, R.; Penkuhn, H.

    1977-01-01

    For the common field of core physics and shielding, the CSEWG group structure of 239 fast neutron groups had been proposed, of which the 100 neutron groups of the EURLIB Library is a sub-set for shielding. This standard group Library EURLIB had been initiated by the NEA-specialist group on shielding benchmarks in 1974. The wide acceptance of the Library for interpretation of benchmarks in the NEA program represents an important step forward in the standardization of group data which is the basic requirement for a useful collaboration. On the other side the interpretation of a series of different benchmark experiments with the EURLIB Library provides the best check of the cross section data for neutron and gamma-rays showing the needs for further improvements. The paper describes the joint work of IKE, Stuttgart and EURATOM, Ispra in generating multigroup libraries for neutron and gamma-rays. Special effort has been devoted to improve the flux weighting for both types of radiation and proper treatment of thermal neutrons. The coupled multigroup Library of 100 neutron and 20 gamma groups is collapsed into few group structures for typical designs of LWR, LMFBR, gas cooled and thermonuclear reactors. The work for optimal few group representation is done in cooperation with EIR, Wurenlingen. The testing of the EURLIB Library is a common effort of several institutions participating in the NEA shielding benchmark program

  17. Expedient preparation of nazlinine and a small library of indole alkaloids using flow electrochemistry as an enabling technology.

    Science.gov (United States)

    Kabeshov, Mikhail A; Musio, Biagia; Murray, Philip R D; Browne, Duncan L; Ley, Steven V

    2014-09-05

    An expedient synthesis of the indole alkaloid nazlinine is reported. Judicious choice of flow electrochemistry as an enabling technology has permitted the rapid generation of a small library of unnatural relatives of this biologically active molecule. Furthermore, by conducting the key electrochemical Shono oxidation in a flow cell, the loading of electrolyte can be significantly reduced to 20 mol % while maintaining a stable, broadly applicable process.

  18. Libraries, National Security, Freedom of Information Laws and Social Responsibilities. IFLA/FAIFE World Report Series Volume V

    Science.gov (United States)

    Seidelin, Susanne, Ed.; Hamilton, Stuart, Ed.

    2005-01-01

    The IFLA/FAIFE World Report Series is unique. It is the only source based on a systematic data collection process that provides an overview of how libraries around the world are tackling barriers to freedom of access to information and freedom of expression. This year's edition includes 84 country reports which detail the extent of Internet access…

  19. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1990-01-01

    New technologies are setting a fast pace in our world. Through science and technology we are able to make our world better, richer and more liveable to everyone. However, the new technologies have brought new mans of destruction and have confronted the world with a real prospect of self destruction. This is one of the main challenges of our age. Greater mutual confidence, openness and, if necessary, checks on how scientific and technological co-operation is used must bring down the existing barriers un the area of technological exchanges. The first results are already evident, for instance in the nuclear field. In our age, science and technology are becoming an inherent element in the comprehensive search for a new, post-confrontational system of peace, security and co-operation. United nations, together with its family of specialized agencies, is called upon to play a major positive role in finding approaches in this area. Scientific and technological progress, especially on the eve of a new millennium in the history of mankind, must serve only to enhance international peace and security and, enable everyone to live a full and worthy life

  20. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  1. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  2. Technostress and Library Values.

    Science.gov (United States)

    Gorman, Michael

    2001-01-01

    Discusses information overload and society's and libraries' responses to technology. Considers eight values that libraries should focus on and how they relate to technology in libraries: democracy, stewardship, service, intellectual freedom, privacy, rationalism, equity of access, and building harmony and balance. (LRW)

  3. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  4. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  5. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    security S&T, and facilitate commercialisation of research outcomes for national benefit. The policy will be delivered through a coherent and...our economy and higher living and education standards1,2. Questions for discussion: Q2.1 Are there other imperatives or drivers that justify the...organisations can drive the uptake of new technology and knowledge. Second, private sector organisations are essential to the commercialisation of

  6. Information security awareness in small information technology-dependent business organisations

    OpenAIRE

    2015-01-01

    M.A. (Business Management) Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exist in the country. A large number of these business organisations can be found in the province of Gauteng because of the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of technology in the small businesses of Gauteng and South Africa, the risks around cyber-secur...

  7. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  8. Factors affecting food security and contribution of modern technologies in food sustainability.

    Science.gov (United States)

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels. Copyright © 2011 Society of Chemical Industry.

  9. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  10. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  11. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  12. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems; (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis

  13. RFID技术在高校图书馆的应用与研究%RFID technology application and research in university library

    Institute of Scientific and Technical Information of China (English)

    王铁; 董四十九

    2012-01-01

    简要论述了RFID技术在高校图书馆的应用与研究,对UHF-RFID和HF-RFID技术在图书馆中的应用进行了比较,对UHF-RFID在未来图书馆发展中的作用进行了展望。%This paper briefly discussed the RFID technology application and research in university library, UHF-RFID and HF-RFID technology application in library were compared, put forward UHF-RFID development and its application prospects in future library.

  14. Office Automation and Information Technology Trends--Their Impact on Libraries and Information Center Management.

    Science.gov (United States)

    Mason, Robert M.

    1986-01-01

    Reviews recent research on the rate of implementation and impacts of office automation (i.e., expanding microcomputer use, expert systems, electronic publishing) and outlines how these impacts may lead to changes in roles and services of libraries and information professionals. (Author/MBR)

  15. Speakeasy Studio and Cafe: Information Literacy, Web-based Library Instruction, and Technology.

    Science.gov (United States)

    Jacobs, Mark

    2001-01-01

    Discussion of academic library instruction and information literacy focuses on a Web-based program developed at Washington State University called Speakeasy Studio and Cafe that is used for bibliographic instruction. Highlights include the research process; asking the right question; and adapting to students' differing learning styles. (LRW)

  16. Multiple-User Microcomputer Technology and Its Application to the Library Environment.

    Science.gov (United States)

    McCarthy, Cathleen D.

    1987-01-01

    Demonstrates the ways in which multiuser and multitasking microcomputer systems can be used for the automation of small- to medium-sized library operations. The possibilities afforded by the IBM-PC AT microcomputer are discussed and a sample configuration with estimated cost projections is provided. (EM)

  17. Securing a better future for all: making a difference with nuclear technology

    International Nuclear Information System (INIS)

    Mohamad, Daud; )

    2014-01-01

    The IAEA is an inter-governmental organization and the world's centre of cooperation in the nuclear field. As per its mandate, the IAEA shall seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world. The IAEA executes its mandate on the basis of three pillars: nuclear verification and security, safety and technology transfer. Nuclear technologies and techniques can offer vital assistance in fighting disease, improving food security and safety, and studying and sustainably managing water resources and the environment. The IAEA's Department of Nuclear Sciences and Applications works to address these critical developmental needs by helping Member States to apply nuclear science and technology more effectively where they have a comparative advantage and can have substantial socio-economic impact. The scale of these needs is growing each day as the world's population and life expectancies increase, as global industry and migration multiply the populations of the world's cities and their demands for resources, and as these trends impact human disease, the availability of safe and sufficient supplies of food and water, the health of our terrestrial and marine ecosystems, and the variability of our climate. These are highly complex challenges, and nuclear science and technology, can make impactful contributions in helping Member States to respond to these challenges

  18. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  19. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  20. Field studies of safety security rescue technologies through training and response activities

    Science.gov (United States)

    Murphy, Robin R.; Stover, Sam

    2006-05-01

    This paper describes the field-oriented philosophy of the Institute for Safety Security Rescue Technology (iSSRT) and summarizes the activities and lessons learned during calendar year 2005 of its two centers: the Center for Robot-Assisted Search and Rescue and the NSF Safety Security Rescue industry/university cooperative research center. In 2005, iSSRT participated in four responses (La Conchita, CA, Mudslides, Hurricane Dennis, Hurricane Katrina, Hurricane Wilma) and conducted three field experiments (NJTF-1, Camp Hurricane, Richmond, MO). The lessons learned covered mobility, operator control units, wireless communications, and general reliability. The work has collectively identified six emerging issues for future work. Based on these studies, a 10-hour, 1 continuing education unit credit course on rescue robotics has been created and is available. Rescue robots and sensors are available for loan upon request.

  1. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  2. Utilizing Web 2.0 Technologies for Library Web Tutorials: An Examination of Instruction on Community College Libraries' Websites Serving Large Student Bodies

    Science.gov (United States)

    Blummer, Barbara; Kenton, Jeffrey M.

    2015-01-01

    This is the second part of a series on Web 2.0 tools available from community college libraries' Websites. The first article appeared in an earlier volume of this journal and it illustrated the wide variety of Web 2.0 tools on community college libraries' Websites serving large student bodies (Blummer and Kenton 2014). The research found many of…

  3. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  4. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.; Joslyn, Cliff A.; West, Curtis L.; Schanfein, Mark J.; Sayre, Amanda M.

    2017-07-17

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLT to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.

  5. Using innovation from block chain technology to address privacy and security problems of Internet of Things

    OpenAIRE

    Manocha, Jitendra

    2017-01-01

    Internet of things (IoT) is growing at a phenomenal speed and outpacing all the technological revolutions that occurred in the past. Together with window of opportunity it also poses quite a few challenges. One of the most important and unresolved challenge is vulnerability in security and privacy in IoT. This is mainly due to lack of a global decentralized standard even though characteristically IoT is based on distributed systems. Due to lack of standard IoT has interoperability issue betwe...

  6. The library

    International Nuclear Information System (INIS)

    1980-01-01

    A specialized library is essential for conducting the research work of the Uranium Institute. The need was recognized at the foundation of the Institute and a full-time librarian was employed in 1976 to establish the necessary systems and begin the task of building up the collection. A brief description is given of the services offered by the library which now contains books, periodicals, pamphlets and press cuttings, focussed on uranium and nuclear energy, but embracing economics, politics, trade, legislation, geology, mining and mineral processing, environmental protection and nuclear technology. (author)

  7. The publication of scientific data by World Data Centers and the National Library of Science and Technology in Germany

    Directory of Open Access Journals (Sweden)

    J Brase

    2006-11-01

    Full Text Available In its 2004 report "Data and information", the International Council for Science (ICSU strongly recommended a new strategic framework for scientific data and information. On an initiative from a working group from the Committee on Data for Science and Technology (CODATA, the German Research Foundation (DFG has started the project "Publication and Citation of Scientific Primary Data" as part of the program "Information-infrastructure of network -based scientific-cooperation and digital publication" in 2004. Starting with the field of earth science, the German National Library of Science and Technology (TIB is now established as a registration agency for scientific primary data as a member of the International DOI Foundation (IDF.

  8. Virtual Libraries: Service Realities.

    Science.gov (United States)

    Novak, Jan

    2002-01-01

    Discussion of changes in society that have resulted from information and communication technologies focuses on changes in libraries and a new market for library services with new styles of clients. Highlights client service issues to be considered when transitioning to a virtual library situation. (Author/LRW)

  9. Smart Buildings: An Introduction to the Library of the Future.

    Science.gov (United States)

    Hoy, Matthew B

    2016-01-01

    Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.

  10. A Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System

    Directory of Open Access Journals (Sweden)

    Rafiya Hossain

    2017-09-01

    Full Text Available Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system is being introduced in the developing countries to avoid corruption in the collection of toll, decrease cost and increase operational efficiency. The goal of this research is to find an integrated solution that enhances security along with the advantage of automated toll collection. Inspired by the availability of many security systems, this research presents a system that can block a specific vehicle or a particular type of vehicles at the toll booths based on directives from the law enforcement agencies. The heart of the system is based on RFID (Radio Frequency Identification technology. In this system, by sending a text message the law enforcement agency or the authority that controls the toll booths can prevent the barrier from being liftedeven after deduction of the toll charge if the passing vehicle has a security issue. The designed system should help the effort of reducing transport crimes on highways and bridges of developing countries.

  11. Research Market Gap in Law Enforcement Technology: Lessons from Czech Security Research Funding Programmes

    Directory of Open Access Journals (Sweden)

    Luděk Moravec

    2014-12-01

    Full Text Available While security research funding schemes are nothing new to the EU (Horizon 2020 and FP7, or to several Member States, their priorities and procedures are usually decided administratively or shaped by advisory groups of varying membership. Only recently did the EU shift its focus to the role of end users in security research programmes, seeking their input in order to maximise the utility of funded solutions. Such a hint to limited usefulness of some industrial solutions is not exactly inconspicuous. This paper discusses the gap between the stated needs of law enforcement agencies in terms of R&D funding and the grant project applications in the area of law enforcement. It aims to define and describe the gap, and consequently the market opportunities, between the supply and demand sides represented by industry-driven grant project applications and end-user-formulated calls. The study is based on empirical data from two Czech security research funding programmes that have been running since 2010 and should deliver their results by 2015. It seeks to contribute some preliminary observations about the structure of both end user needs and industry capabilities in such a particular area as law enforcement technology.

  12. Library as a Partner in Co-Designing Learning Spaces: A Case Study at Tampere University of Technology, Finland

    Science.gov (United States)

    Tevaniemi, Johanna; Poutanen, Jenni; Lähdemäki, Riitta

    2015-01-01

    This article presents a case of co-designed temporary learning spaces at a Finnish academic library, together with the results of a user-survey. The experimental development of the multifunctional spaces offered an opportunity for the library to collaborate with its parent organisation thus broadening the role of the library. Hence, library can be…

  13. Biometrics: libraries have begun to see the value of biometrics

    OpenAIRE

    Panneerselvam, Selvi, M. G.

    2007-01-01

    It explains the Biometric Technologies which are becoming the foundation of an extensive array of highly secure identification and personal verification solution. Biometric devices with special reference to finger print recognition is dealt in detail. The benefits of Biometrics in Libraries, its employees and members are highlighted.

  14. Electrical markets, energy security and technology diversification: nuclear as cover against gas and carbon price risks?

    International Nuclear Information System (INIS)

    Roques, F.A.; Newbery, D.M.; Nuttall, W.J.; Neufville, R. de

    2005-01-01

    Recent tension in the oil and gas markets has brought back the concept of energy offer diversification. Electrical production technology diversification in a country helps improve the security of supply and make up for the negative effects of hydrocarbons price variations. The portfolio and real options theories help to quantify the optimum diversification level for a country or a power company. The cover value of a nuclear investment for a power company facing cost uncertainties (price of gas and of carbon dioxide emission permit) and proceeds (price of electricity) is assessed. A strong link between the prices of gas and electricity reduces incentives to private producers to diversify, disputing the capacity of a liberalized electrical market to achieve optimum technology diversity from a domestic point of view. (authors)

  15. Multi-color IR sensors based on QWIP technology for security and surveillance applications

    Science.gov (United States)

    Sundaram, Mani; Reisinger, Axel; Dennis, Richard; Patnaude, Kelly; Burrows, Douglas; Cook, Robert; Bundas, Jason

    2006-05-01

    Room-temperature targets are detected at the furthest distance by imaging them in the long wavelength (LW: 8-12 μm) infrared spectral band where they glow brightest. Focal plane arrays (FPAs) based on quantum well infrared photodetectors (QWIPs) have sensitivity, noise, and cost metrics that have enabled them to become the best commercial solution for certain security and surveillance applications. Recently, QWIP technology has advanced to provide pixelregistered dual-band imaging in both the midwave (MW: 3-5 μm) and longwave infrared spectral bands in a single chip. This elegant technology affords a degree of target discrimination as well as the ability to maximize detection range for hot targets (e.g. missile plumes) by imaging in the midwave and for room-temperature targets (e.g. humans, trucks) by imaging in the longwave with one simple camera. Detection-range calculations are illustrated and FPA performance is presented.

  16. A data-management system using sensor technology and wireless devices for port security

    Science.gov (United States)

    Saldaña, Manuel; Rivera, Javier; Oyola, Jose; Manian, Vidya

    2014-05-01

    Sensor technologies such as infrared sensors and hyperspectral imaging, video camera surveillance are proven to be viable in port security. Drawing from sources such as infrared sensor data, digital camera images and processed hyperspectral images, this article explores the implementation of a real-time data delivery system. In an effort to improve the manner in which anomaly detection data is delivered to interested parties in port security, this system explores how a client-server architecture can provide protected access to data, reports, and device status. Sensor data and hyperspectral image data will be kept in a monitored directory, where the system will link it to existing users in the database. Since this system will render processed hyperspectral images that are dynamically added to the server - which often occupy a large amount of space - the resolution of these images is trimmed down to around 1024×768 pixels. Changes that occur in any image or data modification that originates from any sensor will trigger a message to all users that have a relation with the aforementioned. These messages will be sent to the corresponding users through automatic email generation and through a push notification using Google Cloud Messaging for Android. Moreover, this paper presents the complete architecture for data reception from the sensors, processing, storage and discusses how users of this system such as port security personnel can use benefit from the use of this service to receive secure real-time notifications if their designated sensors have detected anomalies and/or have remote access to results from processed hyperspectral imagery relevant to their assigned posts.

  17. Evaluating the influence of information and communications technology on food security

    Directory of Open Access Journals (Sweden)

    Ntabeni J. Jere

    2017-05-01

    Objectives: The study evaluates the influence of ICTs in improving food security in KwaZulu-Natal Province. A theoretical framework was developed as the lens through which diffusion and adoption of ICTs can be understood. The theorised model was developed using constructs from the diffusion of innovation (DOI theory, technology acceptance model (TAM and Hofstede’s cultural dimensions theory. Method: Survey data from 517 smallholder farmers from the district municipality of iLembe were collected using a questionnaire. A quantitative approach was followed, and the developed theorised model was analysed using structural equation modelling techniques. Results: This study proposes that ICT influence on food security is associated with culture, perceived usefulness and perceived ease of use. The study further finds that perceived ease of use of ICTs has the most significant effect with regard to ICT adoption and diffusion amongst smallholder farmers in iLembe district municipality. There are, however, no associations found with perceived attributes of innovation and the nature of social systems. The study consisted of a largely homogeneous social system; therefore, the researcher could not make any comparisons. Conclusion: The proposed framework for evaluating the influence of ICTs on food security put forward in this study highlights a number of issues. Firstly, there is need for further study to be conducted to understand adoption of ICTs specifically for food security. This would help in creating more accurate adoption strategies. Secondly, the study informs ICT innovation developers on the need to prioritise ease of use of ICT-based interventions when developing innovations that focus on smallholder farmers. The study also contributes to policy guidelines and suggests clear guidelines be developed to address cultural aspects such as gender imbalances.

  18. Convergence of emerging science and technology trends for defense, security, and human performance

    International Nuclear Information System (INIS)

    Vaseashta, Ashok

    2010-01-01

    sciences and technologies and road-mapping, which describes the emergence and direction of performance, features, or impacts of a science and technology to appear in the future. The development of 'early warning' scanning capabilities to develop awareness and understanding of basic scientific research as well as forthcoming technology and their implications underscore a fundamental change in focus from 'entirely technology-oriented' to 'science based futures-oriented technological approach', echoing the shift in chemical and biological defense strategy from a 'needs-based' to 'capabilities-based' model. The expectation is to minimize the impact of and manage technology uncertainty through exploiting futures-oriented analytical methods, modeling and simulation, and scenario development. The ultimate goal of the IASC futures research is not to predict the future or to influence social decisions in a predictable way. Rather, our aim is visionary to expand research organizations' and scientists' awareness of future threats and opportunities for balanced, strategic S and T analyses and recommendation of revolutionary scientific breakthroughs in support of international security. (author)

  19. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  20. The library catalogue as a retrieval tool in academic libraries: a case ...

    African Journals Online (AJOL)

    The library catalogue as a retrieval tool in academic libraries: a case study of federal university of technology Owerri library. ... Information Technologist (The) ... be emphasized and made compulsory for a ll library users and strengthening the ...

  1. LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY

    Directory of Open Access Journals (Sweden)

    Ramona DUMITRAȘCU

    2017-05-01

    Full Text Available Li-Fi is a wireless technology that transmits high-speed data using visible light communication (VLC, it can achieve speeds of 224 gigabits per second in the lab. The potential Li-Fi technology can change a lot in virtual word considering it can provide transmission at 1 GB per second - that's 100 times faster than current average Wi-Fi speeds. By flickering the light from a single LED, Li-Fi technology can transmit far more data than a cellular tower, using Visible Light Communication (VLC technology - a medium that uses visible light between 400 and 800 terahertz (THz. It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. The benefit of Li-Fi over Wi-Fi, other than potentially much faster speeds, is that because light cannot pass through walls, it makes it a whole lot more secure.

  2. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  3. Science and Technology vs. Defense and Security: Dual Use Consequences, a South American Perspective

    International Nuclear Information System (INIS)

    Espona, M. J.

    2007-01-01

    Nowadays we can say that science and technology are development driven forces in most countries, with some exceptions especially in the Southern Hemisphere. Even though, we have to take into account their link to and impact on defense and security and not only when it comes to WMD but also in the economy and academy areas, both in developed and developing countries. Within this framework, when we analyze the spread of technology and knowledge, it is important to consider: the media where it takes place (e.g. journals, internet, conferences, commercial agreements); which the actors involved are (e.g. scientists, governmental agencies, commercial firms); and the motive why it occurs (e.g. scientific discoveries; commercial exchange; international agreements). Once known all these elements, which vary both intracountry and intercountry, we may have a deep and broad enough framework to consider which policies to take in order to foster scientific and technologic development without collaborating with state and non state WMD programs. Although we already have a legal framework to fight against WMD proliferation and terrorism, the diverse degree of success of such instruments makes it necessary to continue analyzing and debating ways to strengthen them and/or find new ones. Therefore, in this paper we will analyze how the phenomena of science and technology development and spread impacts on defense and security from a South American perspective, taking into account the particular differences among developed and developing countries. Among the primary findings we can mention the existing differences between countries when it comes to the place (military, academic or commercial ones) where the critical science and technology innovative developments take place; the origin of funding (private or governmental); the existence and fulfillment of plans to foster science and technology development; and the scientific community awareness in WMD topics. All these elements have a

  4. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  5. The USF Libraries Virtual Library Project: A Blueprint for Development.

    Science.gov (United States)

    Metz-Wiseman, Monica; Silver, Susan; Hanson, Ardis; Johnston, Judy; Grohs, Kim; Neville, Tina; Sanchez, Ed; Gray, Carolyn

    This report of the Virtual Library Planning Committee (VLPC) is intending to serve as a blueprint for the University of South Florida (USF) Libraries as it shifts from print to digital formats in its evolution into a "Virtual Library". A comprehensive planning process is essential for the USF Libraries to make optimum use of technology,…

  6. National Libraries Section. General Research Libraries Division. Papers.

    Science.gov (United States)

    International Federation of Library Associations, The Hague (Netherlands).

    Papers on national library services and activities, which were presented at the 1983 International Federation of Library Associations (IFLA) conference, include: (1) "The National Library of China in its Gradual Application of Modern Technology," a discussion by Zhu Nan and Zhu Yan (China) of microform usage and library automation; (2)…

  7. The Algorithm Analysis of E-Commerce Security Issues for Online Payment Transaction System in Banking Technology

    OpenAIRE

    Barskar, Raju; Deen, Anjana Jayant; Bharti, Jyoti; Ahmed, Gulfishan Firdose

    2010-01-01

    E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to the constant technological and business change and requires a coordinated match of algorithm and technical solutions. Ecommerce is not appro...

  8. Featured Library: Parrish Library

    OpenAIRE

    Kirkwood, Hal P, Jr

    2015-01-01

    The Roland G. Parrish Library of Management & Economics is located within the Krannert School of Management at Purdue University. Between 2005 - 2007 work was completed on a white paper that focused on a student-centered vision for the Management & Economics Library. The next step was a massive collection reduction and a re-envisioning of both the services and space of the library. Thus began a 3 phase renovation from a 2 floor standard, collection-focused library into a single floor, 18,000s...

  9. What Technology Skills Do Developers Need? A Text Analysis of Job Listings in Library and Information Science (LIS from Jobs.code4lib.org

    Directory of Open Access Journals (Sweden)

    Monica Maceli

    2015-09-01

    Full Text Available Technology plays an indisputably vital role in library and information science (LIS work; this rapidly moving landscape can create challenges for practitioners and educators seeking to keep pace with such change.  In pursuit of building our understanding of currently sought technology competencies in developer-oriented positions within LIS, this paper reports the results of a text analysis of a large collection of job listings culled from the Code4lib jobs website.  Beginning over a decade ago as a popular mailing list covering the intersection of technology and library work, the Code4lib organization's current offerings include a website that collects and organizes LIS-related technology job listings.  The results of the text analysis of this dataset suggest the currently vital technology skills and concepts that existing and aspiring practitioners may target in their continuing education as developers.

  10. Securing Canada’s Information-Technology Infrastructure: Context, Principles, and Focus Areas of Cybersecurity Research

    Directory of Open Access Journals (Sweden)

    Dan Craigen

    2013-07-01

    Full Text Available This article addresses the challenges of cybersecurity and ultimately the provision of a stable and resilient information-technology infrastructure for Canada and, more broadly, the world. We describe the context of current cybersecurity challenges by synthesizing key source material whose importance was informed by our own real-world experiences. Furthermore, we present a checklist of guiding principles to a unified response, complete with a set of action-oriented research topics that are linked to known operational limitations. The focus areas are used to drive the formulation of a unified and relevant research and experimental development program, thereby moving us towards a stable and resilient cyberinfrastructure. When cybersecurity is viewed as an inherently interdisciplinary problem of societal concern, we expect that fundamentally new research perspectives will emerge in direct response to domain-specific protection requirements for information-technology infrastructure. Purely technical responses to cybersecurity challenges will be inadequate because human factors are an inherent aspect of the problem. This article will interest managers and entrepreneurs. Senior management teams can assess new technical developments and product releases to fortify their current security solutions, while entrepreneurs can harness new opportunities to commercialize novel technology to solve a high-impact cybersecurity problem..

  11. Tomorrow's Library: The American View.

    Science.gov (United States)

    Dempsey, Mary A.

    1998-01-01

    Explores the continuing role of the public library in society, discussing the mission of the library (highlights the Chicago Public Library's new mission statement), funding collections and buildings, technology, capital improvements, challenges to intellectual freedom, librarian education, library outreach, and private-sector partnerships. (PEN)

  12. 77 FR 56662 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-13

    ... its business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS... as new developments in systems engineering, cyber-security, knowledge management and how best to... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  13. Food safety and quality through radiation technology: its implications to national security

    Energy Technology Data Exchange (ETDEWEB)

    Lanuza, Luvimina G.

    2012-08-15

    tests showed that the dose used did not modify the sensory properties in such a way that they were detected by both sets of respondents. The study recommended that food irradiation technology be adopted by the national government as one of the means to achieve national food security. The results of this study provide science-based evidence in collaborating previous studies on the role of food irradiation technology in ensuring food security such as when used for post-harvest treatment of agricultural crops and for quarantine treatment of fruits and vegetables for export. It must, however, be recognized that the general population may still have fear of radiation. As such, a concerted effort using the quad-media and other government instrumentalities be utilized to effect a paradigm shift of the populace and increase public awareness and acceptance of irradiated food. One can rightly say that food irradiation technology is a tool for national development, and enhances national security through food security. (author)

  14. Food safety and quality through radiation technology: its implications to national security

    International Nuclear Information System (INIS)

    Lanuza, Luvimina G.

    2012-08-01

    showed that the dose used did not modify the sensory properties in such a way that they were detected by both sets of respondents. The study recommended that food irradiation technology be adopted by the national government as one of the means to achieve national food security. The results of this study provide science-based evidence in collaborating previous studies on the role of food irradiation technology in ensuring food security such as when used for post-harvest treatment of agricultural crops and for quarantine treatment of fruits and vegetables for export. It must, however, be recognized that the general population may still have fear of radiation. As such, a concerted effort using the quad-media and other government instrumentalities be utilized to effect a paradigm shift of the populace and increase public awareness and acceptance of irradiated food. One can rightly say that food irradiation technology is a tool for national development, and enhances national security through food security. (author)

  15. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives

    Directory of Open Access Journals (Sweden)

    Delphine Christin

    2010-04-01

    Full Text Available Wireless Sensor Networks (WSNs are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by the industrial automation community is impeded by open issues, such as security guarantees and provision of Quality of Service (QoS. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine QoS requirements and carry out a threat analysis, which act as basis of our evaluation of the current state-of-the-art. According to the results of this evaluation, we identify and discuss open research issues.

  16. Web technology for emergency medicine and secure transmission of electronic patient records.

    Science.gov (United States)

    Halamka, J D

    1998-01-01

    The American Heritage dictionary defines the word "web" as "something intricately contrived, especially something that ensnares or entangles." The wealth of medical resources on the World Wide Web is now so extensive, yet disorganized and unmonitored, that such a definition seems fitting. In emergency medicine, for example, a field in which accurate and complete information, including patients' records, is urgently needed, more than 5000 Web pages are available today, whereas fewer than 50 were available in December 1994. Most sites are static Web pages using the Internet to publish textbook material, but new technology is extending the scope of the Internet to include online medical education and secure exchange of clinical information. This article lists some of the best Web sites for use in emergency medicine and then describes a project in which the Web is used for transmission and protection of electronic medical records.

  17. Electronic Document Delivery: Converging Standards and Technologies. UDT Series on Data Communication Technologies and Standards for Libraries, Report #2.

    Science.gov (United States)

    Cleveland, Gary

    The development of information technologies such as public access catalogs and online databases has greatly enhanced access to information. The lack of automation in the area of document delivery, however, has created a large disparity between the speed with which citations are found and the provision of primary documents. This imbalance can…

  18. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  19. The Effects of Information Technology on Functions of Planning and Organizing in the University Libraries and a Study on the Turkish case

    Directory of Open Access Journals (Sweden)

    Mesut Kurulgan

    2005-03-01

    Full Text Available Rapid changes in information technology (IT and a growing downward tendency in the cost of computer hardware, involve the use of IT in the university libraries excessively. University libraries have to make some changes in their organisational processes and bodies in order to be able to use the technology effectively. In this sense, the aim of this study is to determine the university library managers' opinions in Turkey on the effects of ITs on planning and organisation which are the basic managing functions and is to determine if these effects have meaningful differences according to personal and organisational variables. This study aims to light the way for other studies in the field since it is the first example in this field.

  20. New flexible origination technology based on electron-beam lithography and its integration into security devices in combination with covert features based on DNA authentication

    Science.gov (United States)

    Drinkwater, John K.; Ryzi, Zbynek; Outwater, Chris S.

    2002-04-01

    Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.

  1. AlphaCo: A Teaching Case on Information Technology Audit and Security

    Directory of Open Access Journals (Sweden)

    Hüseyin Tanriverdi

    2006-03-01

    Full Text Available Recent regulations in the United States (U.S. such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal control mechanisms that minimize them have become important and created an urgent need for professionals who are equipped with IT audit and security skills and knowledge. However, there is severe shortage of teaching cases that can be used in courses aimed at training such professionals. This teaching case begins to address this gap by fostering classroom discussions around IT audit and security issues. It revolves around a hacking incident that compromised online order processing systems of AlphaCo and led to some fraudulent activity. The hacking incident raises a series of questions about IT security vulnerabilities, internal control deficiencies, integrity of financial statements, and independent auditors’ assessment of fraud in the context of the Sarbanes-Oxley Act. The case places students in the roles of executives, IT managers, and auditors and encourages them to discuss several important questions: how and why did the hacking incident happen; what harm did it cause to the firm; how can the firm prevent such hacking incidents in the future; if they do happen, how can the firm detect hacking incidents and fraud sooner; how do auditors assess the impact of such incidents in the context of a financial statement audit; and whether the management

  2. Library/vendor relationships

    CERN Document Server

    Brooks, Sam

    2014-01-01

    A view of the mutual dependence between libraries and vendorsAs technology advances, libraries are forced to reach beyond their own resources to find effective ways to maintain accuracy and superior service levels. Vendors provide databases and integrated library systems that perform those functions for profit. Library/Vendor Relationships examines the increasing cooperation in which libraries find they must participate in, and vice versa, with the vendors that provide system infrastructure and software. Expert contributors provide insights from all sides of this unique collaboration, offering

  3. Electronic Reading and Digital Library Technologies: Understanding Learner Expectation and Usage Intent for Mobile Learning

    Science.gov (United States)

    Hyman, Jack A.; Moser, Mary T.; Segala, Laura N.

    2014-01-01

    Mobile information technology is changing the education landscape by offering learners the opportunity to engage in asynchronous, ubiquitous instruction. While there is a proliferation of mobile content management systems being developed for the mobile Web and stand-alone mobile applications, few studies have addressed learner expectations and…

  4. Globalization, Information Technology and Higher Education in Nigeria: The Roles of Library Professionals

    Science.gov (United States)

    Uwhekadom, Ejimaji Emmanuel; Olawolu, Oladunni Elizabeth

    2013-01-01

    The influence of globalization and information technology on higher education in Nigeria was investigated through a descriptive survey design. Forty-five professional librarians from University of Port Harcourt, Port Harcourt, Ignatius Ajuru University of Education, Rumuolumeni Port Harcourt, Federal College of Education (Technical) Omoku Rivers…

  5. ICT Use: Educational Technology and Library and Information Science Students' Perspectives--An Exploratory Study

    Science.gov (United States)

    Aharony, Noa; Shonfeld, Miri

    2015-01-01

    This study seeks to explore what factors influence students' ICT use and web technology competence. The objectives of this study are the following: (a) To what extent do certain elements of Rogers' (2003) Diffusion of Innovations Theory (DOI) explain students' ICT use, (b) To what extent do personality characteristics derived from the Big Five…

  6. The Impact of Information Behavior in Academic Library Service Quality: A Case Study of the Science and Technology Area in Spain

    Science.gov (United States)

    Pinto, Maria; Fernandez-Marcial, Viviana; Gomez-Camarero, Carmen

    2010-01-01

    This research explores the extent of service quality in Spanish university science and technology libraries, based on the expectations and perceptions of their users: faculty and researchers. Users' information behavior is analyzed with the specially designed BiQual tool, which reveals specific needs such as the greater importance of electronic…

  7. Denver Reengineers: By Relying More on Vendors and Technology, Jo Sarling Explains How the Denver Public Library Shifted Resources to the Public

    Science.gov (United States)

    Sarling, Jo

    2005-01-01

    This article gives details of the developments and changes in the Denver Public Library (DPL). Through a review of advancements in technology, vendor capabilities, staffing levels and talent, as well as outsourcing opportunities, DPL reinvented its workflow and processing. The result? The once giant stacks of books, CDs, videos, and DVDs waiting…

  8. Measuring the Success of Library 2.0 Technologies in the African Context: The Suitability of the DeLone and McLean's Model

    Science.gov (United States)

    Lwoga, Edda Tandi

    2013-01-01

    Purpose: This study aims to examine the suitability of information systems (IS) success model in the adoption of library 2.0 technologies among undergraduate students in the African context, and focused at the Muhimbili University of Health and Allied Sciences (MUHAS) of Tanzania. Design/methodology/approach: Based on the IS success model, the…

  9. Telecommunications Technology: Federal Funding for Schools and Libraries. Report to the Chairman, Committee on Commerce, and the Chairman, Committee on Education and the Workforce, House of Representatives.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Health, Education, and Human Services Div.

    This document reports on federally created or facilitated programs for helping schools and libraries with their telecommunications and information technology efforts. Brief answers to specific questions on program characteristics, potential for duplication, coordination efforts, and available information on fraud, waste, and abuse are provided in…

  10. enforcing tertiary school library rules and regulations

    African Journals Online (AJOL)

    2014-10-31

    Oct 31, 2014 ... beings -library users/patrons. It is also a standard rule that library ... degree of criminal behaviors in the use of their resources (Momodu, 2002). It is also a well known fact that some individual users of academic libraries display disruptive or criminal behaviors within the library and this often poses security ...

  11. Effective Remote Control of Several Outdoor Security Lights by SMS and Wifi Technology

    Directory of Open Access Journals (Sweden)

    M. F. Akorede

    2017-08-01

    Full Text Available The aim of this study was to design and develop a control system using Short Message Service (SMS and wireless networking (WiFi technology to remotely control outdoor security lights in large organisations. The device comprises four main units, namely: the mobile phone or a computer system, the Global System for Mobile communication (GSM modem, the switching unit and the WiFi module. One feature that makes the developed system better than other related existing works is its ability to use two means of control. It makes use of WiFi when the operator is within the coverage area of the network of about 100 m to the device, at no cost, otherwise it uses SMS containing certain codes to control the lights. A Subscriber Identity Module (SIM card is placed in the GSM modem and SMS from the transmitter are sent to that mobile number. The module is also constantly checked by the microcontroller unit, processes the information, extracts the message and command from the GSM modem and WiFi module respectively and then acts accordingly. Owing to its simplicity, C programming is used to programme the microcontroller. The developed device when tested with three lighting points operating on 230V power supply, gives an impressive performance in terms of accuracy and promptness with both SMS and WiFi technology.

  12. Library Standards: Evidence of Library Effectiveness and Accreditation.

    Science.gov (United States)

    Ebbinghouse, Carol

    1999-01-01

    Discusses accreditation standards for libraries based on experiences in an academic law library. Highlights include the accreditation process; the impact of distance education and remote technologies on accreditation; and a list of Internet sources of standards and information. (LRW)

  13. Cutting the Army’s Umbilical Cord: A Study of Emerging Fuel Technologies and Their Impact on National Security

    Science.gov (United States)

    2011-12-01

    Ireland, and Puerto Rico , the dependence presents a national security concern for the United States. In order to decrease the DOD’s dependence, Congress...fuel technologies evaluated are microgrids , solar and wind power generators, and hybrid-electric tactical wheeled vehicles. The method used in the case...claims, this monograph analyzes three case studies. The three emerging fuel technologies evaluated are microgrids , solar and wind power generators

  14. 77 FR 70792 - Privacy Act of 1974; Department of Homeland Security/ALL-004 General Information Technology...

    Science.gov (United States)

    2012-11-27

    ... agency to publish in the Federal Register a description denoting the type and character of each system of... DHS IT resources; IP address of access; Logs of Internet activity; and Records on the authentication... and Technology (NIST) Security Standards from Authentication to Certification and Accreditation...

  15. Using Information Technologies in Professional Training of Future Security Specialists in the USA, Great Britain, Poland and Israel

    Science.gov (United States)

    Kyslenko, Dmytro

    2017-01-01

    The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…

  16. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-11-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  17. An assessment of the effectiveness of fuel cycle technologies for the national energy security enhancement in the electricity sector

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Jun, Eunju; Chang, Soon Heung; Kim, Won Joon

    2009-01-01

    Energy security, in the 21st century, draws significant attention in most countries worldwide, because the national security and sustainable development depend largely on energy security. The anticipated fossil energy depletion and the instability of their supply drive many countries to consider nuclear energy as their alternative energy source for the enhancement of their national energy security. In this study, indicators measuring the level of energy security in the electric power sector are developed and applied for the assessment of the effectiveness of four electric power system schemes which deploy different nuclear fuel cycle technologies, with consideration for the diversification of the energy markets and the vulnerability to economic disruption. Results show that the contribution of the closed fuel cycle scheme is larger than the once-through fuel cycle scheme in the perspective of energy security. In addition, the completely closed fuel cycle with the spent fuel recycling enhances the national energy security to the maximum extent compared to all other fuel cycle schemes. Since a completely closed fuel cycle is hardly affected by the uranium price changes, this scheme is found to be the most favorable scheme, ensuring the stable profit of utilities and stabilizing the electricity tariff. In addition, the completely closed fuel cycle scheme provides the best enhancement of national energy security with respect to energy supply, under reasonable price conditions. The indicators developed in this study can be utilized as a useful instrument for the measurement of the level of the energy security, especially by the countries importing energy resources for the generation of electric power.

  18. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    Science.gov (United States)

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  19. Public Libraries: Adapting to Change.

    Science.gov (United States)

    Durrance, Joan; Van Fleet, Connie

    1992-01-01

    Reports on a study of changing trends in public libraries. Interviews with public library leaders identified five areas of changing emphasis: information technology, community needs, strategic planning, public relations and marketing, and funding. (seven references) (EA)

  20. Libraries in society

    DEFF Research Database (Denmark)

    Kristiansson, Michael; Skouvig, Laura Henriette Christine

    2008-01-01

    The purpose of the paper is to investigate the phenomenon of openness in relation to library development. The term openness is presented and related to library development from historical and theoretical perspectives. The paper elaborates on the differences over time on to how openness has been...... understood in a library setting. Historically, openness in form of the open shelves played a crucial role in developing the modern public library. The paper examines this openness-centred library policy as adopted by Danish public libraries in the beginning of the 20th century by applying the theories...... by Michel Foucault on discourse and power to the introduction of open shelves. Furthermore, the paper discusses current challenges facing the modern public library in coping with openness issues that follow from changes in society and advances in technology. These influences and developments are not least...

  1. 2015 Evidence Analysis Library Systematic Review on Advanced Technology in Food Production.

    Science.gov (United States)

    Edge, Marianne Smith; Kunkel, Mary Elizabeth; Schmidt, Jennifer; Papoutsakis, Constantina

    2018-03-08

    In the late 20th century, plant breeders began using molecular biology techniques such as recombinant DNA, also known as genetic engineering, along with traditional cross-breeding. Ten plant and one animal food have been approved for commercialization in the United States. Today, foods and ingredients from genetically engineered (GE) crops are present throughout the food supply, which has led to varying levels of acceptance. Much discussion exists among consumers and health professionals about the believability of statements made regarding benefits or risks of GE foods. The aim of this systematic review was to examine the evidence on the association of consumption of GE foods and ingredients derived from them on human health, specifically allergenicity, food safety, pesticide consumption, nutrient adequacy, inflammation, and antibiotic resistance. An expert panel conducted a systematic review on advanced technology in food production. The 30 developed questions focused on effects of human consumption of GE foods and the effects of human consumption of foods containing pesticide residues on human health. Primary research published from 1994 to 2014 were identified using PubMed and Agricultural Online Access databases. Additional studies were identified by searching references of review articles. Twenty-one studies met the inclusion criteria. Relevant research addressed five of 30 questions. Four questions focused on food allergenicity, the fifth on nutrient adequacy, and all received a Grade III (limited/weak) rating. No human studies addressed 25 questions on the consumption of foods produced using genetic engineering technologies on gene translocation, cancer, food safety, phenotype expression, inflammation and inflammatory markers, or antibiotic resistance. These questions received a Grade V (grade not assignable). Evidence from human studies did not reveal an association between adverse health effects and consumption of foods produced using genetic engineering

  2. SCHOOL COMMUNITY PERCEPTION OF LIBRARY APPS AGAINTS LIBRARY EMPOWERMENT

    Directory of Open Access Journals (Sweden)

    Achmad Riyadi Alberto

    2017-07-01

    Full Text Available Abstract. This research is motivated by the development of information and communication technology (ICT in the library world so rapidly that allows libraries in the present to develop its services into digital-based services. This study aims to find out the school community’s perception of library apps developed by Riche Cynthia Johan, Hana Silvana, and Holin Sulistyo and its influence on library empowerment at the library of SD Laboratorium Percontohan UPI Bandung. Library apps in this research belong to the context of m-libraries, which is a library that meets the needs of its users by using mobile platforms such as smartphones,computers, and other mobile devices. Empowerment of library is the utilization of all aspects of the implementation of libraries to the best in order to achieve the expected goals. An analysis of the schoolcommunity’s perception of library apps using the Technology Acceptance Model (TAM includes: ease of use, usefulness, usability, usage trends, and real-use conditions. While the empowerment of the library includes aspects: information empowerment, empowerment of learning resources, empowerment of human resources, empowerment of library facilities, and library promotion. The research method used in this research is descriptive method with quantitative approach. Population and sample in this research is school community at SD Laboratorium Percontohan UPI Bandung. Determination of sample criteria by using disproportionate stratified random sampling with the number of samples of 83 respondents. Data analysis using simple linear regression to measure the influence of school community perception about library apps to library empowerment. The result of data analysis shows that there is influence between school community perception about library apps to library empowerment at library of SD Laboratorium Percontohan UPI Bandung which is proved by library acceptance level and library empowerment improvement.

  3. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    Science.gov (United States)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and

  4. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  5. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    International Nuclear Information System (INIS)

    Sinars, Daniel; Scott, Kimberly Carole; Edwards, M. John; Olson, Russell Teall

    2016-01-01

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  6. Report of the National Libraries Committee.

    Science.gov (United States)

    Department of Education and Science, London (England).

    The study was undertaken to examine the functions and organization of the British Museum Library, the National Central Library, the National Lending Library for Science and Technology, and the Science Museum Library in providing national library facilities; to consider whether in the interests of efficiency and economy such facilities should be…

  7. Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach

    OpenAIRE

    Rull Aixa, David

    2018-01-01

    This project is a space of information and knowledge of the IoT paradigm and Blockchain technology with the analysis of the most relevant research articles and the study of the most important threats of IoT technologies and scenarios. In addition, it offers an overview of the current state of the paradigm from the perspective of security and the opportunities that its combination with Blockchain technology can bring to our society. Aquest projecte és un espai d'informació i coneixement ...

  8. Frontiers in transport phenomena research and education: Energy systems, biological systems, security, information technology and nanotechnology

    Energy Technology Data Exchange (ETDEWEB)

    Bergman, T.L.; Faghri, A. [Department of Mechanical Engineering, The University of Connecticut, Storrs, CT 06269-3139 (United States); Viskanta, R. [School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907-2088 (United States)

    2008-09-15

    A US National Science Foundation-sponsored workshop entitled ''Frontiers in Transport Phenomena Research and Education: Energy Systems, Biological Systems, Security, Information Technology, and Nanotechnology'' was held in May of 2007 at the University of Connecticut. The workshop provided a venue for researchers, educators and policy-makers to identify frontier challenges and associated opportunities in heat and mass transfer. Approximately 300 invited participants from academia, business and government from the US and abroad attended. Based upon the final recommendations on the topical matter of the workshop, several trends become apparent. A strong interest in sustainable energy is evident. A continued need to understand the coupling between broad length (and time) scales persists, but the emerging need to better understand transport phenomena at the macro/mega scale has evolved. The need to develop new metrology techniques to collect and archive reliable property data persists. Societal sustainability received major attention in two of the reports. Matters involving innovation, entrepreneurship, and globalization of the engineering profession have emerged, and the responsibility to improve the technical literacy of the public-at-large is discussed. Integration of research thrusts and education activities is highlighted throughout. Specific recommendations, made by the panelists with input from the international heat transfer community and directed to the National Science Foundation, are included in several reports. (author)

  9. International Federation of Library Associations Annual Conference. Papers of the Special Libraries Division: Geographical and Map, Science and Technology and Social Science Libraries Sections (47th, Leipzig, East Germany, August 17-22, 1981).

    Science.gov (United States)

    Sprudzs, Adolf; And Others

    This set of eight papers includes papers presented by participants from the United States, France, East Germany, the United Kingdom, West Germany, and the USSR: "Problems with Sources of Information in International Law and Relations: The Case of the World-Wide Treaty Jungle," by Adolf Sprudzs; "French Map Libraries and National and…

  10. Effect of crude oil and refined petroleum product imports on the national security. Critical technologies

    International Nuclear Information System (INIS)

    1989-01-01

    The report contains the results of an investigation requested under Section 232 of the Trade Expansion Act to study the effect of oil imports on the domestic petroleum industry and on United States energy security. It reviews previous energy security assessments and resulting initiatives, assesses current US energy security, and studies emergency petroleum requirements. The report finds that there have been substantial improvements in US energy security since the last Section 232 Petroleum finding in 1979. However, declining domestic oil production, rising oil imports, and growing dependence on potentially insecure sources of supply raise concerns of vulnerability to a major supply disruption

  11. Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology

    National Research Council Canada - National Science Library

    Kuhn, D

    2002-01-01

    This document is intended to assist those responsible - users, system administrators, and management - for telecommuting security, by providing introductory information about broadband communication...

  12. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.

  13. Cutting-edge technologies for X-ray systems ensuring safety, security, and comfort of diagnosis and treatment

    International Nuclear Information System (INIS)

    Sato, Naotaka; Kuroki, Takahiro

    2015-01-01

    X-ray systems that convert X-rays passing through the human body Into images are widely used in various fields of diagnosis and treatment, due to their simplicity and immediacy. In recent years. Improvements in the image quality and usability of such systems as a result of technological innovations have contributed to more accurate diagnosis and treatment and shorter examination times. Toshiba Medical Systems Corporation has been continuously developing exposure management technologies that can precisely estimate doses of exposure as well as technologies to reduce exposure. We are also making efforts to reduce the burden on patients through the development of technologies to enhance the effectiveness of examinations. By applying these technologies to our various X-ray products, we are actively promoting the provision of medical systems offering safety, security, and comfort to both patients, and operators and other medical staff. (author)

  14. IFLA General Conference, 1984. Management and Technology Division. Section on Information Technology and Joint Meeting of the Round Table Audiovisual Media, the International Association for Sound Archives, and the International Association for Music Libraries. Papers.

    Science.gov (United States)

    International Federation of Library Associations, The Hague (Netherlands).

    Six papers on information technology, the development of information systems for Third World countries, handling of sound recordings, and library automation were presented at the 1984 IFLA conference. They include: (1) "Handling, Storage and Preservation of Sound Recordings under Tropical and Subtropical Climatic Conditions" (Dietrich…

  15. Library and Education

    Directory of Open Access Journals (Sweden)

    Gheorghe Buluţă

    2011-01-01

    Full Text Available The psycho-social phenomena generated by mass-media and the new information and communication technologies at the level of the young generations have led to new communication practices that bypass libraries and revolutionized the intellectual labor practices, with texts being rather used than read. In this context, our article examines the need to increase the library's role in developing the quality of education and research and brings to attention a few possible solutions which include a partnership between various types of libraries and between librarians' associations and NGOs to facilitate education through library and safeguard reading.

  16. Emerging information technologies in accounting and related security risks – what is the impact on the Romanian accounting profession

    Directory of Open Access Journals (Sweden)

    Sînziana-Maria Rîndașu

    2017-12-01

    Full Text Available This study investigates whether aspiring and professional accountants understand the benefits and security challenges brought by emerging technologies such as: Big Data, data analytics, cloud computing and mobile technologies. 115 participants took part in a survey during January and February 2017, all having at least one year of practical experience in accounting or audit and 80% of them being affiliated with national or international accounting professional bodies. The research has three key findings: (1 Professional accountants and auditors are having in average a theoretical knowledge of the emerging technologies in the accounting field, but they still need to enhance their skills to exploit them efficiently, (2 Mobile technologies started to be adopted by the Romanian practitioners and (3 The profession has become aware of the security risks brought by emerging technologies in the digital accounting. The accounting profession is on the verge of change and the practitioners do not yet possess sufficient skills regarding the analyzed emerging technologies. As per this, the professional bodies and academic environment should reassess their curricula to enforce the necessary changes for preparing practitioners to successfully face the future challenges and avoid their replacement by other professions more qualified.

  17. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    Science.gov (United States)

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  18. Teaching Information Security with Workflow Technology--A Case Study Approach

    Science.gov (United States)

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  19. Supporting Case-Based Learning in Information Security with Web-Based Technology

    Science.gov (United States)

    He, Wu; Yuan, Xiaohong; Yang, Li

    2013-01-01

    Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…

  20. The impact of computerisation of library operations on library ...

    African Journals Online (AJOL)

    The use of computer-based systems in libraries and information units is now a vogue. The era of manual system in library operations is on its way to extinction. Recent developments in information world tend towards a globalized information communication technology (ICT). The library as a dynamic institution cannot afford ...