WorldWideScience

Sample records for security degree program

  1. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    Science.gov (United States)

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  2. Developments in the Nuclear Safeguards and Security Engineering Degree Program at Tomsk Polytechnic University

    International Nuclear Information System (INIS)

    Boiko, Vladimir I.; Demyanyuk, Dmitry G.; Silaev, Maxim E.; Duncan, Cristen L.; Heinberg, Cynthia L.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.

    2009-01-01

    Over the last six years, Tomsk Polytechnic University (TPU) has developed a 5 1/2 year engineering degree program in the field of Material Protection Control and Accounting (MPC and A). In 2009 the first students graduated with this new degree. There were 25 job offers from nuclear fuel cycle enterprises of Russia and Kazakhstan for 17 graduates of the program. Due to the rather wide selection of workplaces, all graduates have obtained positions at nuclear enterprises. The program was developed within the Applied Physics and Engineering Department (APED). The laboratory and methodological base has been created taking into consideration the experience of the similar program at the Moscow Engineering Physics Institute (MEPhI). However, the TPU program has some distinguishing features such as the inclusion of special courses pertaining to fuel enrichment and reprocessing. During the last two years, three MPC and A laboratories have been established at APED. This was made possible due to several factors such as establishment of the State innovative educational program at TPU, assistance of the U.S. Department of Energy through Pacific Northwest National Laboratory and Los Alamos National Laboratory, and the financial support of the Swedish Radiation Safety Authority and some Russian private companies. All three of the MPC and A laboratories are part of the Innovative Educational Center 'Nuclear Technologies and Non-Proliferation,' which deals with many topics including research activities, development of new curricula for experts training and retraining, and training of master's students. In 2008, TPU developed a relationship with the International Atomic Energy Agency (IAEA), which was familiarized with APED's current resources and activities. The IAEA has shown interest in creation of a master's degree educational program in the field of nuclear security at TPU. A future objective is to acquaint nuclear fuel cycle enterprises with new APED capabilities and involve

  3. Results in Developing an Engineering Degree Program in Safeguards and Security of Nuclear Materials at Moscow Engineering Physics Institute

    International Nuclear Information System (INIS)

    Kryuchkov, Eduard F.; Geraskin, Nikolay I.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2007-01-01

    The world's first master's degree program in nuclear safeguards and security, established at Moscow Engineering Physics Institute (MEPhI), has now graduated nine classes of students. Most of the graduates have gone on to work at government agencies, research organizations, or obtain their PhD. In order to meet the demand for safeguards and security specialists at nuclear facilities, MEPhI established a 5-1/2 year engineering degree program that provides more hands-on training desired by facilities. In February 2004, the first students began their studies in the new discipline Nuclear Material Safeguards and Nonproliferation. This class, as well as other subsequent classes, included students who started the program in their third year of studies, as the first 2-1/2 years consists of general engineering curriculum. Fourteen students made up the first graduating class, receiving their engineering degrees in February 2007. The topics addressed in this paper include specific features of the program caused by peculiarities of Russian education legislation and government quality control of academic education. This paper summarizes the main joint actions undertaken by MEPhI and the US National Laboratories in conjunction with the U.S. Department of Energy, to develop the engineering degree program. Also discussed are the program's specific training requirements, student internships, and job placement. The paper concludes with recommendations from a recent international seminar on nonproliferation education and training

  4. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  5. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  6. Special Degree Programs for Adults

    Science.gov (United States)

    Continuing Education for Adults, 1970

    1970-01-01

    Briefly describes Bachelor of Liberal Studies programs at six colleges and universities, the Master of Liberal Studies program at Boston University, and the Master of Engineering degree at the University of California at Los Angeles, as well as programs being conducted on a graduate level by Arthur D. Little, Inc. for government and industrial…

  7. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types......, but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...... data and computations to better fulfil the trust requirements of the users. Erasure Policies ensure that the original host of the redistributed data or computation does not store the data any longer....

  8. Education and the Degree of Data Security

    Science.gov (United States)

    Spears, Phillip Dewitt

    2013-01-01

    New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…

  9. Coping with Security in Programming

    OpenAIRE

    Frank Schindler

    2006-01-01

    This article deals with importance of security issues in computer programming.Secure software can only be designed with security as a primary goal. To achieve that wewould have to redesign our computer systems with security in our mind including entirecomputer environment, e.g. hardware, programming languages and, of course, operatingsystems. In software development process the quality of resulting computer code should bethe most important aspect during the whole program development process. ...

  10. Current Trends in Associate Degree Nursing Programs.

    Science.gov (United States)

    Blackstone, Elaine Grant

    This study was designed to ascertain current trends in associate degree nursing programs and to discover innovative ideas and techniques which could be applied to the existing program at Miami-Dade Community College (Florida). Data was compiled from interviews with representatives of ten associate degree nursing programs in six states. Information…

  11. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  12. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  13. Toward the Ideal Professional Master's Degree Program.

    Science.gov (United States)

    Russell, Maria P.

    1999-01-01

    Outlines work accomplished at the 1998 National Communication Association Summer Conference, presenting a model for a professional master's-degree program in public relations that integrates outcomes, assessment, curriculum, and pedagogy. Outlines program outcomes, curriculum, essential curriculum-content areas, pedagogical approaches, and…

  14. Georgia Power Company's college degree program

    International Nuclear Information System (INIS)

    Coggin, C.L.

    1988-01-01

    The purpose of this paper is to describe Georgia Power Company's on-site college degree program for nuclear power plant personnel. In February 1986, the US Nuclear Regulatory Commission issued a policy statement concerning engineering expertise on shift (Generic Letter 86-04), which appeared in Volume 50, Number 208 of the October 28, 1985 Federal Register. One of the options available to nuclear power plant personnel to meet the requirement was the combined senior reactor operator/shift technical adviser position. One of the methods for meeting the option included a bachelor's degree in engineering technology for an accredited institution, including course work in the physical, mathematical, or engineering sciences

  15. Joint Degree Program: the Perspective of Employers

    Directory of Open Access Journals (Sweden)

    Tatjana Bilevičienė

    2013-08-01

    Full Text Available Purpose — the purpose of this article is to extend discussion towards the need and importance of joint degree programs in modern universities, introducing the perspective of the employers toward this question. Design/methodology/approach — the research was conducted to analyze the demand of joint degree programs from the perspective of employers, identify weak and strong aspects, opinion and demand for graduates of such programs. To achieve this purpose, a combination of theoretical and empirical methods was chosen: document analysis (previous studies, statistics was conducted and an online qualitative survey was organized. Findings — The analysis of articles, studies and statistics points out the challenges and threats faced by universities nowadays, forcing higher education institutions to find new ways to raise the quality of studies and raise the interest of employers to choose graduates from MRU, as well as the satisfaction of employers with their choice of employees. Theoretical analysis pointed out these challenges and requirements for the modern employee, summarised the challenges in preparation of IT field specialists. The conducted research results showed that the diploma of joint degree programs would not be treated as an advantage of possible employee from the perspective of employers in case some important aspects will not be taken into consideration by program creators. On the other hand, undeniably there are strong sides, such as knowledge in the fields of foreign language, international experience, innovativeness and creativeness of employees that would be treated as an advantage in the process of selection for positions of any technical support related positions. Research limitations/implications — employers, whose business activities are closely related to information technology, have been invited as experts. In addition, these experts have a good understanding of the specifics of joint degree programs. The received

  16. Double degree master program: Optical Design

    Science.gov (United States)

    Bakholdin, Alexey; Kujawinska, Malgorzata; Livshits, Irina; Styk, Adam; Voznesenskaya, Anna; Ezhova, Kseniia; Ermolayeva, Elena; Ivanova, Tatiana; Romanova, Galina; Tolstoba, Nadezhda

    2015-10-01

    Modern tendencies of higher education require development of master programs providing achievement of learning outcomes corresponding to quickly variable job market needs. ITMO University represented by Applied and Computer Optics Department and Optical Design and Testing Laboratory jointly with Warsaw University of Technology represented by the Institute of Micromechanics and Photonics at The Faculty of Mechatronics have developed a novel international master double-degree program "Optical Design" accumulating the expertise of both universities including experienced teaching staff, educational technologies, and experimental resources. The program presents studies targeting research and professional activities in high-tech fields connected with optical and optoelectronics devices, optical engineering, numerical methods and computer technologies. This master program deals with the design of optical systems of various types, assemblies and layouts using computer modeling means; investigation of light distribution phenomena; image modeling and formation; development of optical methods for image analysis and optical metrology including optical testing, materials characterization, NDT and industrial control and monitoring. The goal of this program is training a graduate capable to solve a wide range of research and engineering tasks in optical design and metrology leading to modern manufacturing and innovation. Variability of the program structure provides its flexibility and adoption according to current job market demands and personal learning paths for each student. In addition considerable proportion of internship and research expands practical skills. Some special features of the "Optical Design" program which implements the best practices of both Universities, the challenges and lessons learnt during its realization are presented in the paper.

  17. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  18. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  19. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  20. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  1. 45 CFR 2400.41 - Degree programs.

    Science.gov (United States)

    2010-10-01

    ... degree in history or political science (including government or politics), the degree of Master of Arts in Teaching in history or political science (including government or politics), or a related master's degree in education that permits a concentration in American history, American government, social studies...

  2. 76 FR 10262 - Information Security Program

    Science.gov (United States)

    2011-02-24

    ... FEDERAL MARITIME COMMISSION 46 CFR Part 503 [Docket No. 11-01] RIN 3072-AC40 Information Security... (FMC or Commission) amends its regulations relating to its Information Security Program to reflect the changes implemented by Executive Order 13526--Classified National Security Information--that took effect...

  3. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.

  4. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory

  5. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  6. What Is the Tech Prep/Associate Degree Program?

    Science.gov (United States)

    Parnell, Dale

    1993-01-01

    Discusses the nature, importance, and future of the Tech Prep/Associate Degree program. Suggests that these programs must move beyond simple articulation and become aggressive in jointly examining, developing, and sustaining high quality educational programs. (JOW)

  7. The security analyzer: A security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.

    1986-09-01

    The Security Analyzer is a software tool capable of analyzing the effectiveness of a facility's security system. It is written in the Prolog logic programming computer language, using entity-relationship data modeling techniques. The program performs the following functions: (1) provides descriptive, locational and operational status information about intrusion detectors and assessment devices (i.e., ''sensors'' and ''cameras'') upon request; (2) provides for storage and retrieval of maintenance history information for various components of the security system (including intrusion detectors), and allows for changing that information as desired; (3) provides a ''search'' mode, wherein all paths are found from any specified physical location to another specified location which satisfy user chosen ''intruder detection'' probability and elapsed time criteria (i.e., the program finds the ''weakest paths'' from a security point of view). The first two of these functions can be provided fairly easily with a conventional database program; the third function could be provided using Fortran or some similar language, though with substantial difficulty. In the Security Analyzer program, all these functions are provided in a simple and straight-forward manner. This simplicity is possible because the program is written in the symbolic (as opposed to numeric) processing language Prolog, and because the knowledge base is structured according to entity-relationship modeling principles. Also, the use of Prolog and the entity-relationship modeling technique allows the capabilities of the Security analyzer program, both for knowledge base interrogation and for searching-type operations, to be easily expanded in ways that would be very difficult for a numeric and more algorithmically deterministic language such as Fortran to duplicate. 4 refs

  8. Challenge: A Multidisciplinary Degree Program in Bioinformatics

    Directory of Open Access Journals (Sweden)

    Mudasser Fraz Wyne

    2006-06-01

    Full Text Available Bioinformatics is a new field that is poorly served by any of the traditional science programs in Biology, Computer science or Biochemistry. Known to be a rapidly evolving discipline, Bioinformatics has emerged from experimental molecular biology and biochemistry as well as from the artificial intelligence, database, pattern recognition, and algorithms disciplines of computer science. While institutions are responding to this increased demand by establishing graduate programs in bioinformatics, entrance barriers for these programs are high, largely due to the significant prerequisite knowledge which is required, both in the fields of biochemistry and computer science. Although many schools currently have or are proposing graduate programs in bioinformatics, few are actually developing new undergraduate programs. In this paper I explore the blend of a multidisciplinary approach, discuss the response of academia and highlight challenges faced by this emerging field.

  9. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  10. Marketing and Retention Strategies for Adult Degree Programs

    Science.gov (United States)

    Brown, Joann A.

    2004-01-01

    Four marketing strategies are critical to the success of adult degree programs: integrating marketing, knowing your students (research), shaping programs and services for adults, and staying the course (retention).

  11. Business Administration and Computer Science Degrees: Earnings, Job Security, and Job Satisfaction

    Science.gov (United States)

    Mehta, Kamlesh; Uhlig, Ronald

    2017-01-01

    This paper examines the potential of business administration vs. computer science degrees in terms of earnings, job security, and job satisfaction. The paper focuses on earnings potential five years and ten years after the completion of business administration and computer science degrees. Moreover, the paper presents the income changes with…

  12. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  13. Hygiene and Industrial Security Program: General aspects

    International Nuclear Information System (INIS)

    1988-01-01

    This Venezuelan standard establishes the aspects that must be included in the elaboration and monitoring of an Hygiene and Industrial Security Program (Prevention of Accidents and Occupational Diseases Program). It is applicable to any type of exploitation company, or any kind of task (in nature or importance) where people work, no matter the number workers [es

  14. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way....... This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques...

  15. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  16. Human Service Administrator Perceptions of Online MSW Degree Programs

    Science.gov (United States)

    Curran, Laura; Sanchez Mayers, Ray; Fulghum, Fontaine

    2017-01-01

    Online programs have proliferated rapidly in higher education, and this reality holds true for social work education as well. Employing a mixed methods design, this study looked at employer perceptions of online degrees compared to traditional degrees. Data was collected through an online survey that included Likert type and open-ended questions…

  17. Secure Degrees of Freedom of the Gaussian Z Channel with Single Antenna

    Directory of Open Access Journals (Sweden)

    Xianzhong XIE

    2014-03-01

    Full Text Available This paper presents the secrecy capacity and the secure degrees of freedom of Gaussian Z channel with single antenna and confidential information. Firstly, we analysis the secrecy capacity and the upper bound of secure degrees of freedom of this channel in theory. Then, we respectively discuss the security pre-coding scheme for real Gaussian channel model and frequency selection channel model. Under the first model, through real interference alignment and cooperative jamming, we obtain the secrecy capacity and secure degrees of freedom, proving that it can reach the upper bound of secure degrees of freedom in theory. While, under the second one, a strong security pre-coding algorithm is proposed, which is based on the fact that sparse matrix has strong hash property. Next, we arrange interference with interference alignment and the receivers process their received signal through zero forcing algorithm. At last, the messages are reconstructed with maximum likelihood decoding, where it shows that the algorithm can asymptotically achieve the optimal secrecy capacity.

  18. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  19. Maintaining quality control in a nontraditional nuclear technology degree program

    International Nuclear Information System (INIS)

    DeSain, G.W.

    1989-01-01

    Regents College, created by the Board of Regents of the University of The State on New York in 1971, has been offering, since January 1985, AS and BS degrees in nuclear technology. The impetus for establishing the nuclear technology degrees came from nuclear utility management and had to do with the US Nuclear Regulatory Commission proposed rule regarding degreed operators on shift. There are a variety of ways to earn credits in Regents College degree programs: (1) college courses taken for degree-level credit from regionally accredited colleges; (2) courses sponsored by business, industry, or government that have been evaluated and recommended for credit by the New York National or American Council on Education (ACE's) Program on Noncollegiate Sponsored Instruction (PONSI); (3) military education that has been evaluated by ACE PONSI; (4) approved college-proficiency examinations; and (5) special assessment: an individualized examination of college-level knowledge gained from experience or independent study. Nuclear technology students primarily use college course work, evaluated military education, and proficiency examinations to complete degree programs. However, an increasing number of utilities are having training programs PONSI evaluated, resulting in an increased use of these courses in the nuclear technology degrees. Quality control is a function of several factors described in the paper

  20. Competencies for Graduate Culinary Management Degree Programs: Stakeholders' Perspectives

    Science.gov (United States)

    George, Annette A.

    2009-01-01

    Available literature on graduate hospitality education was highly focused on required competencies for hospitality management degree programs but not on culinary management. One possible explanation is that the culinary sector still lags behind in the formation of graduate culinary management programs in the United States. This causal comparative…

  1. Enterpreneurship/Small Business Degree Programs at Community Colleges

    Science.gov (United States)

    Maidment, Fred

    2007-01-01

    Associate degree programs at community colleges in small business/entrepreneurship were examined in this article. The study examined the community college programs in entrepreneurship and small business related, small business administration and entrepreneurship listed in "Perterson's Guide to Two-Year Colleges" (Oram, 2005). Current catalogs…

  2. Providing Homeless Adults with Advantage: A Sustainable University Degree Program

    Science.gov (United States)

    Sinatra, Richard; Lanctot, Melissa Kim

    2016-01-01

    A university partnered with the New York City Department of Homeless Services (NYC DHS) to provide cohorts of adults a 60-credit Associate Degree Program in Business Administration over a 2-year period. Results of two cohorts of 30 Advantage Academy Program graduates revealed significant improvement in College Board AccuPlacer (ACPL) Arithmetic…

  3. Nontraditional Degree Options for Nurses: A Model Program

    Science.gov (United States)

    Walston, Sydney C.

    1978-01-01

    The Institute for Personal and Career Development of Central Michigan University offers external degree programs for adult learners using nontraditional study. The competency-based programs described include credit given for the educational background and relevant career-life experiences of registered nurses in Michigan. (Author/LBH)

  4. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  5. The road to developing an advanced degree program in public health preparedness.

    Science.gov (United States)

    Cherry, Robert A; Davis, Tom

    2007-08-01

    The master of homeland security (MHS) degree in public health preparedness at the Pennsylvania State University College of Medicine is the first degree program of its kind offered by any U.S. medical school. The field of public health preparedness has been increasingly viewed as a new, emerging professional discipline, which academic medicine is well positioned to complement. The process by which the MHS program has evolved from conception to realization is a case study in the mission-based alignment of core values and leadership between the government and academic medicine. Recognizing the need for multidisciplinary involvement, the program architects reconsidered the traditional approach to the development and implementation of new graduate degree programs. Instead, a more flexible, loosely connected network of strategic partners and alliances was adopted. These partnerships were developed and cultivated by vested individuals who excelled in specific core competencies and came together to create value. This allowed for both the expertise and flexibility needed to adapt quickly to the evolving homeland security environment in the United States. To that end, this article describes the 10-step multidisciplinary program-development process that spanned three years and culminated in the establishment of this new graduate degree program. The MHS program as it now stands focuses on public health preparedness, including epidemiological evaluation, disaster communication and psychology, agricultural biosecurity, and critical infrastructure protection. The program is geared toward the practicing professional already working in the field, and its graduates are positioned to be among the top leaders, educators, and researchers in homeland security.

  6. The Maryland nuclear science baccalaureate degree program: The university perspective

    International Nuclear Information System (INIS)

    Janke, T.A.

    1989-01-01

    Nuclear utilities' efforts in response to industry-wide pressures to provide operations staff with degree opportunities have encountered formidable barriers. This paper describes, from the university's perspective, the development and operation of the University of Maryland University College (UMUC) special baccalaureate program in nuclear science. This program has successfully overcome these problems to provide degree education on-site, on-line, and on time. Program delivery began in 1984 with one utility and a single site. It is currently delivered at eight sites under contract to six utilities with a total active student count of over 500. The first graduates are expected in 1989. The program is an accredited university program and enjoys licensure approval from the six states within which it operates. In addition to meeting US Nuclear Regulatory Commission proposed guidelines for degreed operators, the program increasingly appears as part of utility management development programs for all plant personnel and a factor in employee retention. The owner utilities, the University of Maryland, and the growing user's group are committed to the academic integrity, technical capability, and responsiveness of the program. The full support of this partnership speaks well for the long-term service of the Bachelor of Science in Nuclear Science program to the nuclear power industry

  7. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  8. User Interface Program for secure electronic tags

    International Nuclear Information System (INIS)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US

  9. 7 CFR 772.7 - Leasing minor program loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of security...

  10. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  11. The Maryland nuclear science baccalaureate degree program: The utility perspective

    International Nuclear Information System (INIS)

    Mueller, J.R.

    1989-01-01

    In the early 1980s, Wisconsin Public Service Corporation (WPSC) made a firm commitment to pursue development and subsequent delivery of an appropriate, academically accredited program leading to a baccalaureate degree in nuclear science for its nuclear operations personnel. Recognizing the formidable tasks to be accomplished, WPSC worked closely with the University of Maryland University College (UMUC) in curriculum definition, specific courseware development for delivery by computer-aided instruction, individual student evaluation, and overall program implementation. Instruction began on our nuclear plant site in the fall of 1984. The university anticipates conferring the first degrees from this program at WPSC in the fall of 1989. There are several notable results that WPSC achieved from this degree program. First and most importantly, an increase in the level of education of our employees. It should be stated that this program has been well received by WPSC operator personnel. These employees, now armed with plant experience, a formal degree in nuclear science, and professional education in management are real candidates for advancement in our nuclear organization

  12. Research Projects at Chulalongkorn University for the Master Degree Programme in Nuclear Security and Safeguard

    International Nuclear Information System (INIS)

    Nilsuwankosit, S.

    2015-01-01

    The Department of Nuclear Engineering, Faculty of Engineering, Chulalongkorn University, Thailand, began its master degree programme in nuclear security and safeguard in November 2013 with the support from the CBRN-Center of Excellence, European Union. This programme was planned as a way to raise the awareness of various local agencies in ASEAN countries regarding the threat of CBRN events. In the long run, the programme will also serve as the platform to develop the human resource and to provide the professional assistance required to counter such threat in the region. The programme closely follows the guideline as given by the IAEA and employs its materials as the main source of references. The first batch of 20 students came from countries in the ASEAN community. Due to the nature of the program, each student is required to conduct the research and a thesis based on such research is to be submitted as part of the requirement for the graduation. Currently, the research subjects that are readily available to the students can be classified into 5 categories: 1. subjects with neutron generator, 2. subjects with nuclear electronics and instruments, 3. subjects with industrial applications, 4. subjects with computer simulations, and 5. subjects with policy research. (author)

  13. The security analyzer, a security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.; Carlson, R.L.

    1987-01-01

    A technique has been developed to characterize a nuclear facility and measure the strengths and weaknesses of the physical protection system. It utilizes the artificial intelligence capabilities available in the prolog programming language to probe a facility's defenses and find potential attack paths that meet designated search criteria. As sensors or barriers become inactive due to maintenance, failure, or inclement weather conditions, the protection system can rapidly be reanalyzed to discover weaknesses that would need to be strengthened by alternative means. Conversely, proposed upgrades and enhancements can be easily entered into the database and their effect measured against a variety of potential adversary attacks. Thus the security analyzer is a tool that aids the protection planner as well as the protection operations staff

  14. Transnational Degree Program Franchising and the Challenge of Commercial Franchisees

    Science.gov (United States)

    Juusola, Katariina; Rensimer, Lee

    2018-01-01

    Purpose: The purpose of this paper is to explore the interrelationship of branding practices and legitimacy-building of commercial degree program franchising within transnational higher education (TNHE). It aims to understand how commercial franchisees' branding practices employ discursive and symbolic strategies for building legitimacy, and how…

  15. Evaluating Quality in Associate Degree Culinary Arts Programs

    Science.gov (United States)

    Hertzman, Jean; Ackerman, Robert

    2010-01-01

    Purpose: The purpose of this study is to determine which categories and indicators of quality are best suited to evaluating associate degree culinary arts programs (ADCAP). Design/methodology/approach: The researchers surveyed a national sample of culinary educators and industry chefs in the USA. The instrument asked the participants to rate the…

  16. Using "Kaizen" to Improve Graduate Business School Degree Programs

    Science.gov (United States)

    Emiliani, M. L.

    2005-01-01

    Purpose: To illustrate the applicability of "kaizen" in higher education. Design/methodology/approach: "Kaizen" process was used for ten courses contained in a part-time executive MS degree program in management. Findings: "Kaizen" was found to be an effective process for improving graduate business school courses and the value proposition for…

  17. Effectiveness of the Civil Aviation Security Program.

    Science.gov (United States)

    1978-03-31

    Passenger Screening Results 12. Scope of Civil Aviation Security Program 13. Basic Policies 14. Explosives Detection Dog Teams 15. Explosives Detection... policies guiding the program recognize airline responsibilities for the safety of passengers, baggage and cargo in their care as well as for the...U *i * (U U Los -7 .cn cf) 1-4 ~~LL _m e- Hf LMU 0- u,-C -oL -ccJLL LII -~ LLIOL 0 _ CL. LLJ cr-L LCnIJ C ~ ~ CnCD C. ) &j 2ic- nc r JL AJ -L JC C.- L

  18. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  19. Persistence of Women in Online Degree-Completion Programs

    Directory of Open Access Journals (Sweden)

    Terry Müller

    2008-06-01

    Full Text Available Although online courses at postsecondary institutions promise adults access, flexibility, and convenience, many barriers to online learning remain. This article presents findings from a qualitative case study, which explored the phenomenon of undergraduate and graduate women learners’ persistence in online degree-completion programs at a college in the Northeast of the United States. Research questions asked why women learners persisted or failed to persist, and how factors supporting or hindering persistence influenced learners. Interviews with a purposeful sample of 20 participants revealed the complexity of variables affecting learners’ persistence to graduation. Findings suggested that multiple responsibilities, insufficient interaction with faculty, technology, and coursework ranked highest as barriers to women’s persistence. Strong motivation to complete degrees, engagement in the learning community, and appreciation for the convenience of an online degree-completion option facilitated persistence.

  20. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  1. SPORTS PHYSICAL THERAPY CURRICULA IN PHYSICAL THERAPIST PROFESSIONAL DEGREE PROGRAMS.

    Science.gov (United States)

    Mulligan, Edward P; DeVahl, Julie

    2017-10-01

    The specialty niche of sports physical therapy has grown at a significant rate over the past 40 years. Despite this growth there is little information or direction from the physical therapy education accreditation body or professional association to guide academic programs on the interest or necessity of this type of practice content in physical therapy professional degree programs. The purpose of this survey study is to report on the prevalence, attitudes, barriers, resources, and faculty expertise in providing required or elective sports physical therapy course work. Cross-sectional descriptive survey. A 57-item questionnaire with branching logic was distributed via a web-based electronic data capture tool to survey all Commission on Accreditation for Physical Therapy Education (CAPTE) accredited and candidate schools in the United States. Response data was analyzed to describe typical educational program profiles, faculty demographics, and correlational factors consistent with the presence or absence of specific sports physical therapy curricular content. Thirty one percent of the schools responded to the survey and the program demographics were consistent with all currently accredited schools in regards to their geography, Carnegie classification, and faculty and student size. Forty three percent of programs offered a required or elective course distinct to the practice of sports physical therapy. Descriptive information regarding the sequencing, curricular make-up, resources, and assessment of content competence is reported. The odds of providing this content nearly doubles for programs that have faculty with sports clinical specialist credentials, accredited sports residency curriculums, or state practice acts that allow sports venue coverage. This survey provides an initial overview of sports physical therapy educational efforts in professional physical therapy degree programs. The data can used to spur further discussion on the necessity, structure, and

  2. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  3. A unique degree program for pre-pharmacy education: An undergraduate degree in pharmaceutical sciences.

    Science.gov (United States)

    Jafari, Mahtab

    2018-02-01

    Within the coming decade, the demand for well-trained pharmacists is expected to only increase, especially with the aging of the United States (US) population. To help fill this growing demand, the University of California, Irvine (UCI) aims to offer a unique pre-pharmacy degree program and has developed a Bachelor of Science (BS) degree in Pharmaceutical Sciences to help achieve this goal. In this commentary, we share our experience with our curriculum and highlight its features in an effort to encourage other institutions to enhance the learning experience of their pre-pharmacy students. The efforts of the UCI Department of Pharmaceutical Sciences has resulted in UCI being consistently ranked as one of the top feeder institutions by the Pharmacy College Application Service (PharmCAS) in recent years. The UCI Pharmaceutical Sciences Bachelor of Science offers a unique pre-pharmacy educational experience in an effort to better prepare undergraduates for the rigors of the doctorate of pharmacy curriculum. Copyright © 2017. Published by Elsevier Inc.

  4. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  5. Review on Cyber Security Programs for NPP Application

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eung Se [KEPRI, Daejeon (Korea, Republic of)

    2010-10-15

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS; CFR; RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  6. Review on Cyber Security Programs for NPP Application

    International Nuclear Information System (INIS)

    Oh, Eung Se

    2010-01-01

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS] [CFR] [RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  7. Associate in science degree education programs: organization, structure, and curriculum.

    Science.gov (United States)

    Galvin, William F

    2005-09-01

    After years of discussion, debate, and study, the respiratory care curriculum has evolved to a minimum of an associate degree for entry into practice. Although programs are at liberty to offer the entry-level or advanced level associate degree, most are at the advanced level. The most popular site for sponsorship of the associate degree in respiratory care is the community college. The basis for community college sponsorship seems to be its comprehensive curriculum, which focuses on a strong academic foundation in writing, communication, and the basic sciences as well as supporting a career-directed focus in respiratory care. Issues facing the community college are tied to literacy, outcomes, assessment, placement,cooperation with the community, partnerships with industry, and articulation arrangements with granting institutions granting baccalaureate degrees. Community colleges must produce a literate graduate capable of thriving in an information-saturated society. Assessment and placement will intensify as the laissez-faire attitudes toward attendance and allowing students to select courses without any accountability and evaluation of outcome become less acceptable. Students will be required to demonstrate steady progress toward established outcomes. Maintaining relations and cooperation with the local community and the health care industry will continue to be a prominent role for the community college. The challenge facing associate degree education in respiratory care at the community college level is the ability to continue to meet the needs of an expanding professional scope of practice and to provide a strong liberal arts or general education core curriculum. The needs for a more demanding and expanding respiratory care curriculum and for a rich general education core curriculum have led to increased interest in baccalaureate and graduate degree education. The value of associate degree education at the community college level is well established. It is

  8. Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure

    OpenAIRE

    Xie, Jianwei; Ulukus, Sennur

    2014-01-01

    The sum secure degrees of freedom (s.d.o.f.) of two fundamental multi-user network structures, the K-user Gaussian multiple access (MAC) wiretap channel and the K-user interference channel (IC) with secrecy constraints, have been determined recently as K(K-1)/(K(K-1)+1) [1,2] and K(K-1)/(2K-1) [3,4], respectively. In this paper, we determine the entire s.d.o.f. regions of these two channel models. The converse for the MAC follows from a middle step in the converse of [1,2]. The converse for t...

  9. Dual Degree Social Work Programs: Where are the Programs and Where are the Graduates?

    Directory of Open Access Journals (Sweden)

    Shari E. Miller

    2008-09-01

    Full Text Available This article presents results of an exploratory study designed to survey the dual degree graduates of one large school of social work, and to report on the prevalence and types of dual degree programs offered at accredited schools of social work in the U.S. Quantitative and qualitative data were gathered from 72 dual degree graduates. Income, career trajectories, identification with social work, satisfaction with the decision to obtain a dual degree, whether graduates would encourage others to follow the dual degree path, and implications for the social work profession and social work education are discussed.

  10. Physical protection educational program - information security aspects

    International Nuclear Information System (INIS)

    Tolstoy, A.

    2002-01-01

    Full text: Conceptual approaches for designing an expert training program on object physical protection taking into account information security aspects are examined. A special educational course does not only address the immediate needs for an educational support but also ensures that new professionals include new concepts and knowledge in their practice and encourages current practitioners towards such practice. Features of the modern physical protection systems (PPS) and classification of information circulating at them are pointed out. The requirements to the PPS information protection subsystem are discussed. During the PPS expert training on information security (IS) aspects they should receive certain knowledge, on the basis of which they could competently define and carry out the PPS IS policy for a certain object. Thus, it is important to consider minimally necessary volume of knowledge taught to the PPS experts for independent and competent implementation of the above listed tasks. For the graduate PPS IS expert training it is also necessary to examine the normative and legal acts devoted to IS as a whole and the PPS IS in particular. It is caused by necessity of conformity of methods and information protection tools implemented on a certain object to the federal and departmental IS requirements. The departmental normative IS requirements define an orientation of the PPS expert training. By curriculum development it is necessary to precisely determine for whom the PPS experts are taught. The curriculum should reflect common features of the PPS functioning of the certain object type, i.e. it should be adapted to a certain customer of the experts. The specified features were taken into account by development of an educational course 'Information security of the nuclear facility physical protection systems', taught at the Moscow Engineering Physics Institute (State University) according to the Russian-American educational program 'Master in Physical

  11. 33 CFR 101.125 - Approved Alternative Security Programs.

    Science.gov (United States)

    2010-07-01

    ... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...

  12. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  13. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  14. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... shall have, at a minimum, the following security devices: (1) A means of protecting cash or other liquid assets, such as a vault, safe, or other secure space; (2) A lighting system for illuminating, during the...

  15. The essential research curriculum for doctor of pharmacy degree programs.

    Science.gov (United States)

    Lee, Mary W; Clay, Patrick G; Kennedy, W Klugh; Kennedy, Mary Jayne; Sifontis, Nicole M; Simonson, Dana; Sowinski, Kevin M; Taylor, William J; Teply, Robyn M; Vardeny, Orly; Welty, Timothy E

    2010-09-01

    In 2008, the American College of Clinical Pharmacy appointed the Task Force on Research in the Professional Curriculum to review and make recommendations on the essential research curriculum that should be part of doctor of pharmacy (Pharm.D.) degree programs. The essential research curriculum provides all students with critical and analytical thinking and lifelong learning skills, which will apply to current and future practice and stimulate some students to pursue a career in this field. Eight key curricular competencies are as follows: identifying relevant problems and gaps in pharmacotherapeutic knowledge; generating a research hypothesis; designing a study to test the hypothesis; analyzing data results using appropriate statistical tests; interpreting and applying the results of a research study to practice; effectively communicating research and clinical findings to pharmacy, medical, and basic science audiences; interpreting and effectively communicating research and clinical findings to patients and caregivers; and applying regulatory and ethical principles when conducting research or using research results. Faculty are encouraged to use research-related examples across the curriculum in nonresearch courses and to employ interactive teaching methods to promote student engagement. Examples of successful strategies used by Pharm.D. degree programs to integrate research content into the curriculum are provided. Current pharmacy school curricula allow variable amounts of time for instructional content in research, which may or may not include hands-on experiences for students to develop research-related skills. Therefore, an important opportunity exists for schools to incorporate the essential research curriculum. Despite the challenges of implementing these recommendations, the essential research curriculum will position pharmacy school graduates to understand the importance of research and its applications to practice. This perspective is provided as an aid

  16. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Science.gov (United States)

    2013-09-27

    ...] Secure Supply Chain Pilot Program; Correction AGENCY: Food and Drug Administration, HHS. ACTION: Notice... Federal Register of August 20, 2013 (78 FR 51192). The document announced the start of the Secure Supply Chain Pilot Program (SSCPP). The document was published with an incorrect email address for the SSCPP...

  17. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  18. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  19. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  20. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  1. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  2. Proposed Accreditation Standards for Degree-Granting Correspondence Programs Offered by Accredited Institutions.

    Science.gov (United States)

    McGraw-Hill Continuing Education Center, Washington, DC.

    A study on proposed accreditation standards grew out of a need to (1) stimulate the growth of quality correspondence degree programs; and (2) provide a policy for accreditation of correspondence degree programs so that graduates would be encouraged to pursue advanced degree programs offered elsewhere by educational institutions. The study focused…

  3. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  4. Use of computer programs to evaluate effectiveness of security systems

    International Nuclear Information System (INIS)

    Harris, L. Jr.; Goldman, L.A.; Mc Daniel, T.L.

    1987-01-01

    Thirty or more computer programs for security vulnerability analysis were developed from 1975 through 1980. Most of these programs are intended for evaluating security system effectiveness against outsider threats, but at least six programs are primarily oriented to insider threats. Some strengths and weaknesses of these programs are described. Six of these programs, four for outsider threats and two for insider threats, have been revised and adapted for use with IBM personal computers. The vulnerability analysis process is discussed with emphasis on data collection. The difference between design data and operational data is described. For performance-type operational data, such as detection probabilities and barrier delay times, the difference between unstressed and stressed performance data is discussed. Stressed performance data correspond to situations where an adversary attempts to weaken a security system by mitigating certain security measures. Suggestions are made on the combined use of manual analysis and computer analysis

  5. Resources available for applying metrics in security and safety programming.

    Science.gov (United States)

    Luizzo, Anthony

    2016-01-01

    Incorporating metrics into security surveys has been championed as a better way of substantiating program-related effectiveness and expenditures. Although security surveys have been aroundfor well over 40 years, rarely, if ever, have metric-related strategies been part of the equation, the author says. In this article, he cites several published articles and research findings available to security professionals and their surveyors that may give them the expertise and confidence they need to make use of this valuable tool.

  6. Department of Energy security program needs effective information systems

    International Nuclear Information System (INIS)

    1991-10-01

    Although security is an important, nearly billion-dollar-a-year function in the Department of Energy (DOE), key information systems that hold important data about security weaknesses and incidents have limited analytical capabilities and contain unreliable information. The resultant difficulty in identifying patterns and trends reduces managers' ability to ensure the effectiveness of the security program. Resources are also wasted because DOE has deployed incompatible systems that are unable to electronically share or transfer data, often forcing employees to manually re-enter data that are already stored in computers elsewhere. Finally, continuing data problems with other important security information systems, such as those used to track security clearances and classified documents, indicate that information system deficiencies are extensive. A major reason for these problems is that DOE has not done a comprehensive, strategic assessment of its information and information technology needs of the security program. DOE's efforts are fragmented because it has not assigned to any organization the leadership responsibility to determine security information needs and to plan and manage security information resources Department-wide. This paper reports that a number of changes are needed to correct these problems and take advantage of information technology to help strengthen the security program

  7. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    Keywords: static security, gene expression programming, probabilistic neural network ... Hence digital computers are usually installed in operations control centers to gather ...... power system protection, and applications of AI in power systems.

  8. "Business Continuity and Information Security Maintenance" Masters’ Training Program

    OpenAIRE

    Miloslavskaya , Natalia; Senatorov , Mikhail; Tolstoy , Alexandr; Zapechnikov , Sergei

    2013-01-01

    Part 1: WISE 8; International audience; The experience of preparing for the "Business Continuity and Information Security Maintenance" (BC&ISM) Masters’ program implementation and realization at the "Information Security of Banking Systems" Department of the National Research Nuclear University MEPhI (NRNU MEPhI, Moscow, Russia) is presented. Justification of the educational direction choice for BC&ISM professionals is given. The model of IS Master being trained on this program is described. ...

  9. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  10. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Managers' Council, Radiological Control

    2018-03-12

    This is a shared document required by 10 CFR 835 for all contractors conducting radiological work at the Nevada National Security Site. Please record the Author as "Radiological Control Managers' Council" for consistency with previous RPPs and Rad Con Manuals.

  11. Speeding decisions. Social security's information exchange program.

    Science.gov (United States)

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  12. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  13. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  14. Factors Affecting Adult Student Dropout Rates in the Korean Cyber-University Degree Programs

    Science.gov (United States)

    Choi, Hee Jun; Kim, Byoung Uk

    2018-01-01

    Few empirical studies of adult distance learners' decisions to drop out of degree programs have used large enough sample sizes to generalize the findings or data sets drawn from multiple online programs that address various subjects. Accordingly, in this study, we used a large administrative data set drawn from multiple online degree programs to…

  15. Current Trends in Communication Graduate Degrees: Survey of Communications, Advertising, PR, and IMC Graduate Programs

    Science.gov (United States)

    Quesenberry, Keith A.; Coolsen, Michael K.; Wilkerson, Kristen

    2015-01-01

    A survey of 61 master's degree advertising programs reveals significant trends in program titles, curriculum design, course delivery, and students served. The results provide insight for current and planned master's degree programs as research predicts a continued increase in demand for master's education over the next decade. Survey results are…

  16. Colleges and Universities with Degree or Certificate Bearing Programs in Creativity

    Science.gov (United States)

    Yudess, Jo

    2010-01-01

    In this article, the author presents a list of colleges and universities with degree or certificate bearing programs in creativity. Since this focuses only on degree bearing programs, an individual might also focus on creativity by working with a specific faculty member in a more general program such as industrial-organizational psychology or…

  17. Hardware-Assisted System for Program Execution Security of SOC

    Directory of Open Access Journals (Sweden)

    Wang Xiang

    2016-01-01

    Full Text Available With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program’s code and data, monitoring its normal execution. The mechanism mainly monitors three types of information: the start/end address of the program of basic blocks; the lightweight hash value in basic blocks and address of the next basic block. These parameters are extracted through additional tools running on PC. The information will be stored in the security module. During normal program execution, the security module is designed to compare the real-time state of program with the information in the security module. If abnormal, it will trigger the appropriate security response, suspend the program and jump to the specified location. The module has been tested and validated on the SOPC with OR1200 processor. The experimental analysis shows that the proposed mechanism can defence a wide range of common software and physical attacks with low performance penalties and minimal overheads.

  18. Ensuring Secure Non-interference of Programs by Game Semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    Non-interference is a security property which states that improper information leakages due to direct and indirect flows have not occurred through executing programs. In this paper we investigate a game semantics based formulation of non-interference that allows to perform a security analysis...... of closed and open procedural programs. We show that such formulation is amenable to automated verification techniques. The practicality of this method is illustrated by several examples, which also emphasize its advantage compared to known operational methods for reasoning about open programs....

  19. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  20. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  1. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  2. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  3. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  4. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial...... on secret values and results are only revealed according to specific protocols. We identify the key linguistic concepts of SMC and bridge the gap between high-level security requirements and low-level cryptographic operations constituting an SMC platform, thus improving the efficiency and security of SMC...

  5. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  6. A flexible framework for secure and efficient program obfuscation.

    Energy Technology Data Exchange (ETDEWEB)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  7. Establishing a framework for a physician assistant/bioethics dual degree program.

    Science.gov (United States)

    Carr, Mark F; Bergman, Brett A

    2014-01-01

    : Numerous medical schools currently offer a master of arts (MA) in bioethics dual degree for physicians. A degree in bioethics enhances the care physicians provide to patients and prepares physicians to serve on ethics committees and consult services. Additionally, they may work on institutional and public policy issues related to ethics. Several physician assistant (PA) programs currently offer a master of public health (MPH) dual degree for PAs. A degree in public health prepares PAs for leadership roles in meeting community health needs. With the success of PA/MPH dual degree programs, we argue here that a PA/bioethics dual degree would be another opportunity to advance the PA profession and consider how such a program might be implemented. The article includes the individual perspectives of the authors, one of whom completed a graduate-level certificate in bioethics concurrently with his 2-year PA program, while the other served as a bioethics program director.

  8. [Research in the Master's Degree program in Social Medicine].

    Science.gov (United States)

    Laurell, C; Mercer, H

    1981-01-01

    The authors report on research as part of the master's degree in social medicine at the Metropolitan Autonomous University, Xochimilco campus, Mexico. They discuss research within the curriculum design, instructional research, teaching staff and research, and research as a source of knowledge. They explain that in order to establish guidelines for research it is necessary to consider the health-disease process and medical practice within the economic and social framework and therefore subject to analysis by the social sciences. Finally, they summarize ongoing research in the fields of social epidemiology, medical practice and planning, and human resources.

  9. Mentoring program for students newly enrolled in an Engineering Degree

    Directory of Open Access Journals (Sweden)

    Juan Pedro Peña-Martín

    2016-10-01

    Full Text Available This work presents a mentoring program for first year engineering students in the Telecommunications Engineering College (ETSIT at the University of Malaga (UMA. Actors involved in the program are professors from staff, veterans mentoring students and, of course, freshmen. All of them has been organized trough the Moodle based Virtual Learning Environment Platform of the UMA. The program has gone through several phases over three years. This paper shows the main objectives of this mentoring program, the initial design to get them where professors played mentor role, and successive changes made to try to improve the results, including the assumption of the mentor role by senior students (peer mentoring. The tools used for program evaluation are shown too. Despite the low participation, it has been a framework for the development of various educational and socializing activities (for mentors and mentees focused on developing generic competences. Furthermore, it has been a research tool to get a better understanding of problems affecting students newly enrolled.

  10. Automated Manufacturing/Robotics Technology: Certificate and Associate Degree Programs.

    Science.gov (United States)

    McQuay, Paul L.

    A description is provided of the Automated Manufacturing/Robotics program to be offered at Delaware County Community College beginning in September 1984. Section I provides information on the use of reprogramable industrial robots in manufacturing and the rapid changes in production that can be effected through the application of automated…

  11. Asnuntuck Community College's Machine Technology Certificate and Degree Programs.

    Science.gov (United States)

    Irlen, Harvey S.; Gulluni, Frank D.

    2002-01-01

    States that although manufacturing remains a viable sector in Connecticut, it is experiencing skills shortages in the workforce. Describes the machine technology program's purpose, the development of the Asnuntuck Community College's (Connecticut) partnership with private sector manufacturers, the curriculum, the outcomes, and benefits of…

  12. Evaluation in STEM Online Graduate Degree Programs in Agricultural Sciences and Engineering

    Science.gov (United States)

    Downs, Holly A.

    2014-01-01

    Demands for online graduate degrees have increased pressure on universities to launch web degrees quickly and, at times, without attending to their quality. Scarce research exists identifying what evaluation activities are being done by science, technology, engineering, and mathematics (STEM) online graduate degree programs that are accustomed to…

  13. Current Trends in Adult Degree Programs: How Public Universities Respond to the Needs of Adult Learners

    Science.gov (United States)

    Gast, Angela

    2013-01-01

    Although many adult students turn to online degree programs due to their flexibility and convenience, a majority of prospective adult learners prefer to take classes on traditional brick-and-mortar campuses. This chapter examines how public research universities create pathways to degree attainment and boost degree completion rates among adult…

  14. An Exploration of Factors Affecting Persistence to Degree Completion in an Undergraduate Music Education Program

    Science.gov (United States)

    Gavin, Russell B.

    2016-01-01

    The purpose of this study was to explore the experiences of students (N = 26) in an undergraduate music education degree program in an attempt to identify commonalities among students persisting to degree completion. All participants were in their final year of the music education degree at the time of the study. Multiple data collection methods…

  15. Language Issues in Mobile Program Security

    Science.gov (United States)

    1998-01-01

    primitives for instance synchronous operations Nondeterminism and Privacy Now suppose we introduce nondeterminism via a simple concurrent language...code setting is that the only observable events are those that can be observed from within a mobile program using language primitives and any host...Possibilistic NI is given in It uses a main thread and two triggered threads each with a busy wait loop implementing a semaphore to copy every bit of

  16. Students' Desired and Experienced Levels of Connectivity to an Asynchronous, Online, Distance Degree Program

    Science.gov (United States)

    Schroeder, Shawnda; Baker, Mary; Terras, Katherine; Mahar, Patti; Chiasson, Kari

    2016-01-01

    This study examined graduate students' desired and experienced levels of connectivity in an online, asynchronous distance degree program. Connectivity was conceptualized as the students' feelings of community and involvement, not their level of access to the Internet. Graduate students enrolled in a distance degree program were surveyed on both…

  17. Third Space Strategists: International Students Negotiating the Transition from Pathway Program to Postgraduate Coursework Degree

    Science.gov (United States)

    Benzie, Helen

    2015-01-01

    Pathway programs exist to prepare students for progression into university degrees but the transition experience for many students may not be as smooth as is suggested by the notion of the pathway. While attending a pathway program and at the beginning of their university degree, students may be in a third space, a liminal space where they engage…

  18. Audit program for physical security systems at nuclear power plants

    International Nuclear Information System (INIS)

    Minichino, C.

    1982-01-01

    Licensees of nuclear power plants conduct audits of their physical security systems to meet the requirements of 10 CFR 73, Physical Protection of Plants and Materials. Section 73.55, Requirements for physical Protection of Licensed Activities in Nuclear Power Reactors Against Radiological Sabotage, requires that the security programs be reviewed at least every 12 months, that the audit be conducted by individuals independent of both security management and security supervision, and that the audit program review all aspects of the physical security system: hardware, personnel, and operational and maintenance procedures. This report contains information for the Nuclear Regulatory Commission (NRC) and for the licensees of nuclear power reactors who carry out these comprehensive audits. Guidance on the overall management of the audit function includes organizational structure and issues concerning the auditors who perform the review: qualifications, independence, due professional care, and standards. Guidance in the audit program includes purpose and scope of the audit, planning, techniques, post-audit procedures, reporting, and follow-up

  19. Security Measures in Automated Assessment System for Programming Courses

    Directory of Open Access Journals (Sweden)

    Jana Šťastná

    2015-12-01

    Full Text Available A desirable characteristic of programming code assessment is to provide the learner the most appropriate information regarding the code functionality as well as a chance to improve. This can be hardly achieved in case the number of learners is high (500 or more. In this paper we address the problem of risky code testing and availability of an assessment platform Arena, dealing with potential security risks when providing an automated assessment for a large set of source code. Looking at students’ programs as if they were potentially malicious inspired us to investigate separated execution environments, used by security experts for secure software analysis. The results also show that availability issues of our assessment platform can be conveniently resolved with task queues. A special attention is paid to Docker, a virtual container ensuring no risky code can affect the assessment system security. The assessment platform Arena enables to regularly, effectively and securely assess students' source code in various programming courses. In addition to that it is a motivating factor and helps students to engage in the educational process.

  20. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  1. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  2. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  3. Building effective cybersecurity programs a security manager's handbook

    CERN Document Server

    Schreider, Tari

    2017-01-01

    You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

  4. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  5. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  6. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  7. An Undergraduate Information Security Program: More than a Curriculum

    Science.gov (United States)

    Woodward, Belle; Imboden, Thomas; Martin, Nancy L.

    2013-01-01

    This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…

  8. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  9. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  10. Supporting secure programming in web applications through interactive static analysis

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  11. Supporting secure programming in web applications through interactive static analysis

    Directory of Open Access Journals (Sweden)

    Jun Zhu

    2014-07-01

    Full Text Available Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  12. Supporting secure programming in web applications through interactive static analysis.

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  13. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  14. Student satisfaction and academic performance in a dual PharmD/MBA degree program.

    Science.gov (United States)

    Chumney, Elinor C G; Ragucci, Kelly R

    2006-04-15

    Evaluate the academic experience and satisfaction of students enrolled in the dual PharmD/MBA degree program between the South Carolina College of Pharmacy and The Citadel's School of Business Administration. Compare grade point averages of students enrolled in the dual degree program with those of traditional student colleagues. A standardized satisfaction survey instrument was administered to 32 students currently enrolled in the dual PharmD/MBA degree program. Grade point averages (GPAs) in both pharmacy and business coursework were also collected for analysis. There were slightly higher percentages of both female and minority students in the dual degree program compared to the pharmacy class as a whole. Eighteen (56%) of students completed the survey, and responses were generally positive. The mean GPA of students in the dual degree program was higher than that of both pharmacy (3.37 vs 3.08, p vs 3.64, not statistically significant) students not enrolled in the dual degree program. Students enrolled in the dual degree program did better academically than their counterparts and indicated an overall high level of satisfaction with the program.

  15. Carboy Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors

  16. Cyber Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  17. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  18. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  19. Master’s Degree Programs of Camarines Norte State College, Philippines: Impact on Its Graduates

    Directory of Open Access Journals (Sweden)

    Godofredo E. Peteza, Jr.

    2017-02-01

    Full Text Available This research determined the impact of the master’s degree programs offered in the Graduate School such as Master in Business Administration, Master in Public Administration, Master in Management majors in Human Resource Management and Educational Planning and Management on its graduates from 2009 to 2013. Descriptive-survey method supplemented by interview was employed to identify specifically the profile of the graduates of master’s degree programs in terms of age, sex, civil status, level of appointment before and after taking the master’s degree program, monthly income before and after taking the master’s degree program, number of promotions after graduation, and years in service and the impact of the CNSC Graduate School’s Master’s Degree Programs along professional practice, career development; and employment. Results show that majority of the respondents are in the middle age from 31 -37 years old, married, mostly females, 6-10 years in service and have one promotion after they have graduated from their respective master’s degrees. The level of appointment of the respondents has a positive movement from rank and file to supervisory and managerial levels positions. The Graduate School’s Master’s degree programs provided high impact on the graduates’ professional practice, and on employment while average impact on career development.

  20. Extracting classification rules from an informatic security incidents repository by genetic programming

    Directory of Open Access Journals (Sweden)

    Carlos Javier Carvajal Montealegre

    2015-04-01

    Full Text Available This paper describes the data mining process to obtain classification rules over an information security incident data collection, explaining in detail the use of genetic programming as a mean to model the incidents behavior and representing such rules as decision trees. The described mining process includes several tasks, such as the GP (Genetic Programming approach evaluation, the individual's representation and the algorithm parameters tuning to upgrade the performance. The paper concludes with the result analysis and the description of the rules obtained, suggesting measures to avoid the occurrence of new informatics attacks. This paper is a part of the thesis work degree: Information Security Incident Analytics by Data Mining for Behavioral Modeling and Pattern Recognition (Carvajal, 2012.

  1. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, D.

    2005-01-01

    Full text: In support of United States Government (USG) and International Atomic Energy Agency (IAEA) nuclear security programs, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been developed and implemented as the basis for a performance-based methodology for the design and evaluation of physical protection systems against a design basis threat (DBT) for theft and sabotage of nuclear and/or radiological materials. Integrated systems must include technology, people, and the man-machine interface. A critical aspect of the human element is training on the systems-approach for all the stakeholders in nuclear security. Current training courses and workshops have been very beneficial but are still rather limited in scope. SNL has developed two primary international classes - the international training course on the physical protection of nuclear facilities and materials, and the design basis threat methodology workshop. SNL is also completing the development of three new courses that will be offered and presented in the near term. They are vital area identification methodology focused on nuclear power plants to aid in their protection against radiological sabotage, insider threat analysis methodology and protection schemes, and security foundations for competent authority and facility operator stakeholders who are not security professionals. In the long term, we envision a comprehensive nuclear security curriculum that spans policy and technology, regulators and operators, introductory and expert levels, classroom and laboratory/field, and local and offsite training options. This training curriculum will be developed in concert with a nuclear security series of guidance documents that is expected to be forthcoming from the IAEA. It is important to note that while appropriate implementation of systems based on such training and documentation can improve the risk reduction, such a

  2. Impact of degree program satisfaction on the persistence of college students

    NARCIS (Netherlands)

    Suhre, Cor J. M.; Jansen, Ellen P. W. A.; Harskamp, Evert

    Many theories on college retention recognize the significance of student satisfaction as a positive factor in students' persistence. Yet, there are few theories that address the relationship of degree program satisfaction to study behaviour and dropout. This paper explores the impact of degree

  3. Perceptions of Community of Associate Degree Nurse Learners in an RN-to-BSN Online Program

    Science.gov (United States)

    Rebar, Cherie R.

    2010-01-01

    Registered Nurses (RNs), when educated in an Associate Degree (AD) program, learn in a face-to-face environment. Today's preferred standard of education for RNs is to achieve a minimum of a Bachelor's degree. For convenience while they continue working, numerous AD-prepared nurses seek online education to complete their Bachelor of Science in…

  4. SoTL and Students' Experiences of Their Degree-Level Programs: An Empirical Investigation

    Science.gov (United States)

    Matthews, Kelly E.; Divan, Aysha; John-Thomas, Nicole; Lopes, Valerie; Ludwig, Lynn O.; Martini, Tanya S.; Motley, Phillip; Tomljenovic-Berube, Ana M.

    2013-01-01

    In the global higher education sector, government accountability initiatives are increasingly focused on degree-level competencies that may be expected from university graduates. The purpose of this paper was to examine the extent to which SoTL reflects this increased interest in student learning across the degree program. Articles (N = 136)…

  5. African Social Studies Program-1, 1988-89. Final Report. A Master's Degree Program for African Social Studies Leaders.

    Science.gov (United States)

    Indiana Univ., Bloomington.

    This paper presents the final report on a project that brought African social studies education leaders to Indiana University (Bloomington) to take part in a Master's Degree program. The report contains a brief history of the program, a description of the program, a discussion of issues relating to acculturation, an evaluation, a list of…

  6. Master’s Degree Programs of Camarines Norte State College, Philippines: Impact on Its Graduates

    OpenAIRE

    Godofredo E. Peteza, Jr.

    2017-01-01

    This research determined the impact of the master’s degree programs offered in the Graduate School such as Master in Business Administration, Master in Public Administration, Master in Management majors in Human Resource Management and Educational Planning and Management on its graduates from 2009 to 2013. Descriptive-survey method supplemented by interview was employed to identify specifically the profile of the graduates of master’s degree programs in terms of age, sex, civil ...

  7. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter

  8. Influence of year-on-year performance on final degree classification in a chiropractic master's degree program.

    Science.gov (United States)

    Dewhurst, Philip; Rix, Jacqueline; Newell, David

    2016-03-01

    We explored if any predictors of success could be identified from end-of-year grades in a chiropractic master's program and whether these grades could predict final-year grade performance and year-on-year performance. End-of-year average grades and module grades for a single cohort of students covering all academic results for years 1-4 of the 2013 graduating class were used for this analysis. Analysis consisted of within-year correlations of module grades with end-of-year average grades, linear regression models for continuous data, and logistic regression models for predicting final degree classifications. In year 1, 140 students were enrolled; 85.7% of students completed the program 4 years later. End-of-year average grades for years 1-3 were correlated (Pearson r values ranging from .75 to .87), but the end-of-year grades for years 1-3 were poorly correlated with clinic internship performance. In linear regression, several modules were predictive of end-of-year average grades for each year. For year 1, logistic regression showed that the modules Physiology and Pharmacology and Investigative Imaging were predictive of year 1 performance (odds ratio [OR] = 1.15 and 0.9, respectively). In year 3, the modules Anatomy and Histopathology 3 and Problem Solving were predictors of the difference between a pass/merit or distinction final degree classification (OR = 1.06 and 1.12, respectively). Early academic performance is weakly correlated with final-year clinic internship performance. The modules of Anatomy and Histopathology year 3 and Problem Solving year 3 emerged more consistently than other modules as being associated with final-year classifications.

  9. Law-Based Degree Programs in Business and Their Departments: What's in a Name? (A Comprehensive Study of Undergraduate Law-Based Degrees in AACSB-Accredited Universities)

    Science.gov (United States)

    Miller, Carol J.; Crain, Susan J.

    2007-01-01

    This study examines undergraduate law-based degree programs in the 404 U.S. universities with undergraduate degrees in business that had Association to Advance Collegiate Schools of Business (AACSB) accreditation in 2005. University Web sites were used to identify and compare law-based undergraduate programs inside business to law-related programs…

  10. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  11. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  12. Method for solving fully fuzzy linear programming problems using deviation degree measure

    Institute of Scientific and Technical Information of China (English)

    Haifang Cheng; Weilai Huang; Jianhu Cai

    2013-01-01

    A new ful y fuzzy linear programming (FFLP) prob-lem with fuzzy equality constraints is discussed. Using deviation degree measures, the FFLP problem is transformed into a crispδ-parametric linear programming (LP) problem. Giving the value of deviation degree in each constraint, the δ-fuzzy optimal so-lution of the FFLP problem can be obtained by solving this LP problem. An algorithm is also proposed to find a balance-fuzzy optimal solution between two goals in conflict: to improve the va-lues of the objective function and to decrease the values of the deviation degrees. A numerical example is solved to il ustrate the proposed method.

  13. A review of forensic science higher education programs in the United States: bachelor's and master's degrees.

    Science.gov (United States)

    Tregar, Kristen L; Proni, Gloria

    2010-11-01

    As the number of forensic science programs offered at higher education institutions rises, and more students express an interest in them, it is important to gain information regarding the offerings in terms of courses, equipment available to students, degree requirements, and other important aspects of the programs. A survey was conducted examining the existing bachelor's and master's forensic science programs in the U.S. Of the responding institutions, relatively few were, at the time of the survey, accredited by the forensic science Education Programs Accreditation Commission (FEPAC). In general, the standards of the responding programs vary considerably primarily in terms of their size and subjects coverage. While it is clear that the standards for the forensic science programs investigated are not homogeneous, the majority of the programs provide a strong science curriculum, faculties with advanced degrees, and interesting forensic-oriented courses. © 2010 American Academy of Forensic Sciences.

  14. Availability and Perceived Value of Masters of Business Administration Degree Programs in Pharmaceutical Marketing and Management

    Science.gov (United States)

    Clauson, Kevin A.; Latif, David A.

    2012-01-01

    Objectives. To examine pharmacist-targeted master of business administration (MBA) degree programs and investigate pharmacists’ perceptions regarding them. Methods. Specialized MBA programs in pharmaceutical marketing and management offered at US colleges and schools of pharmacy were identified in the literature and compared. Pharmacists’ perceptions of MBA programs were evaluated through a survey of clinical preceptors affiliated with a school of pharmacy. Results. Seven US universities that offer an MBA program in pharmaceutical marketing and management were identified. Thirty-three percent of the 57 pharmacist preceptors who responded to the survey reported plans to pursue an MBA degree program. Respondents preferred MBA programs related to healthcare or pharmacy (66%) over general MBA programs (33%). Conclusion. An MBA in pharmaceutical marketing and management could provide pharmacists with advanced knowledge of the operational and strategic business aspects of pharmacy practice and give pharmacy graduates an advantage in an increasingly competitive job market. PMID:22611273

  15. Availability and perceived value of masters of business administration degree programs in pharmaceutical marketing and management.

    Science.gov (United States)

    Alkhateeb, Fadi M; Clauson, Kevin A; Latif, David A

    2012-05-10

    To examine pharmacist-targeted master of business administration (MBA) degree programs and investigate pharmacists' perceptions regarding them. Specialized MBA programs in pharmaceutical marketing and management offered at US colleges and schools of pharmacy were identified in the literature and compared. Pharmacists' perceptions of MBA programs were evaluated through a survey of clinical preceptors affiliated with a school of pharmacy. Seven US universities that offer an MBA program in pharmaceutical marketing and management were identified. Thirty-three percent of the 57 pharmacist preceptors who responded to the survey reported plans to pursue an MBA degree program. Respondents preferred MBA programs related to healthcare or pharmacy (66%) over general MBA programs (33%). An MBA in pharmaceutical marketing and management could provide pharmacists with advanced knowledge of the operational and strategic business aspects of pharmacy practice and give pharmacy graduates an advantage in an increasingly competitive job market.

  16. Carboy Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, Daniel [Idaho National Laboratory, Idaho (United States)

    2012-03-15

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  17. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  18. Administrators' Perceptions of Motives to Offer Online Academic Degree Programs in Universities

    Science.gov (United States)

    Özcan, Hakan; Yildirim, Soner

    2018-01-01

    Although the number of online academic degree programs offered by universities in Turkey has become increasingly significant in recent years, the current lack of understanding of administrators' motives that contribute to initiating these programs suggests there is much to be learned in this field. This study aimed to investigate administrators'…

  19. The Curriculum Planning Process for Undergraduate Game Degree Programs in the United Kingdom and United States

    Science.gov (United States)

    McGill, Monica M.

    2012-01-01

    Digital games are marketed, mass-produced, and consumed by an increasing number of people and the game industry is only expected to grow. In response, postsecondary institutions in the UK and the U.S. have started to create game degree programs. Though curriculum theorists provide insight into the process of creating a new program, no formal…

  20. Stressors Experienced by Nursing Students Enrolled in Baccalaureate Second Degree Accelerated Registered Nursing Programs

    Science.gov (United States)

    Bell, Charlene

    2017-01-01

    A mounting concern throughout the country is a current and growing nursing shortage. In order to meet the growing demand of nurses, many colleges have created baccalaureate second degree accelerated registered nursing programs. Stressors, experienced by nursing students in these accelerated programs, may affect their retention. A deeper…

  1. Institutional Goal Priorities in Texas: A Look at an Associate Degree Nursing Program.

    Science.gov (United States)

    De Leon, John E.

    A study examined the perceptions of four key constituent groups from the Southeast College Associate Degree Nursing (ADN) program regarding institutional goal priorities. (Southeast College manages the ADN program for the Houston Community College System.) The study involved 23 ADN faculty, 13 college administrators, 128 ADN students, and 5 ADN…

  2. Syllabus for an Associate Degree Program in Applied Marine Biology and Oceanography.

    Science.gov (United States)

    Banerjee, Tapan

    Included is a detailed outline of the content of each course required or offered as an elective in the associate degree program. With an 18 or 19 unit load each semester the program requires two years, and includes 64 hours at sea every semester. In addition to chemistry, physics, biology, and oceanography courses, there is a required course in…

  3. Security auditing: a prescription for keeping protection programs healthy.

    Science.gov (United States)

    Luizzo, Anthony

    2010-01-01

    The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.

  4. Evaluation of a Secure Laptop-Based Testing Program in an Undergraduate Nursing Program: Students' Perspective.

    Science.gov (United States)

    Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan

    2016-01-01

    Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.

  5. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  6. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  7. Factors affecting attrition from associate degree nursing programs in North Carolina.

    Science.gov (United States)

    Fraher, Erin; Belsky, Daniel W; Gaul, Katie; Carpenter, Jessica

    2010-01-01

    Projected nursing shortfalls have spurred the state of North Carolina to initiate a series of strategies to increase the number of graduates from pre-licensure Registered Nurse (RN) programs. These efforts have been largely successful, but attrition rates from Associate Degree Nursing (ADN) programs remain high. Only 58% of students entering ADN programs complete the degree. While policy makers are keenly aware that attrition from ADN programs is problematic, there is a lack of empirical evidence to identify the specific factors contributing to student attrition. In late 2007, the North Carolina Community College System (NCCCS) asked the Cecil G. Sheps Center for Health Services Research to conduct a study of Associate Degree Nursing program attrition and its causes. This paper summarizes the findings from that study and identifies the student- and program-level characteristics associated with more and less successful ADN programs. While this study was conducted in a single state in the US, the substantive findings--as well as the methodological approach--may be useful to other states and other countries. The study revealed that socioeconomically disadvantaged students (those with GEDs and those who received Pell Grants), non-white students, and younger and older students were less likely to graduate on-time. When programs were grouped into high and low performance categories on the basis of risk adjusted graduation rates, high performing programs were distinguished by more stringent admissions policies and better educated faculties. Nursing shortages have garnered significant attention and resources from state and national workforce planners in recent years. But to date, investments in expanding program capacity have not been matched by attention to program completion rates, with the result that we have enlarged the pipeline without fixing the leaks. Faculty shortages and recession-induced resource constraints limit further program expansion. Addressing attrition

  8. The Design of an Undergraduate Degree Program in Computer & Digital Forensics

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2006-09-01

    Full Text Available Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and on-campus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and current and planned initiatives.

  9. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  10. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  11. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  12. Understanding the Prevalence of Geo-Like Degree Programs at Minority Serving Institutions

    Science.gov (United States)

    McDaris, J. R.; Manduca, C. A.; Larsen, K.

    2014-12-01

    Over the decade 2002-12, the percentage of students from underrepresented minorities (URM) graduating with geoscience degrees has increased by 50%. In 2012, of the nearly 6,000 geoscience Bachelor's degrees, 8% were awarded to students from URM. But that same year across all of STEM, 18% of Bachelors went to these students, and URM made up 30% of the US population overall. Minority Serving Institutions (MSIs) play an important role in increasing the diversity of geoscience graduates where there are appropriate degree programs or pathways to programs. To better understand opportunities at these institutions, the InTeGrate project collected information on degree programs at MSIs. A summer 2013 survey of websites for three types of MSIs confirmed that, while stand-alone Geology, Geoscience, or Environmental Science departments are present, there are a larger number of degree programs that include elements of geoscience or related disciplines (geography, GIS, etc.) offered in interdisciplinary departments (e.g. Natural Sciences and Math) or cognate science departments (Physics, Engineering, etc.). Approximately one-third of Hispanic Serving Institutions and Tribal Colleges and one-fifth of Historically Black Colleges and Universities offer at least one degree that includes elements of geoscience. The most common programs were Geology and Environmental Science (94 and 88 degrees respectively), but 21 other types of program were also found. To better profile the nature of these programs, 11 interviews were conducted focusing on strategies for attracting, supporting, and preparing minority students for the workforce. In conjunction with the February 2014 Broadening Access to the Earth and Environmental Sciences workshop, an additional 6 MSI profiles were obtained as well as 22 profiles from non-MSIs. Several common strategies emerge: Proactive marketing and outreach to local high schools and two-year colleges Community building, mentoring and advising, academic support

  13. Design and Assessment of an Associate Degree-Level Plant Operations Technical Education Program

    Science.gov (United States)

    Selwitz, Jason Lawrence

    2017-01-01

    Research was undertaken to develop and evaluate an associate degree-level technical education program in Plant Operations oriented towards training students in applied science, technology, engineering, and mathematics (STEM) skills and knowledge relevant to a spectrum of processing industries. This work focuses on four aspects of the curriculum…

  14. Open Educational Resources: A Review of Attributes for Adoption in an Online Bachelor's Degree Program

    Science.gov (United States)

    Neely, Patricia; Tucker, Jan P.; Au, Angela

    2016-01-01

    As concerns about the skyrocketing costs of a college degree have converged with the increasing availability of open educational resources (OER), higher education administrators are asking faculty and curriculum designers to use OERs to design courses and programs. This case study explores the decision making process and outcomes of an online,…

  15. Organizational Learning to Implementation: Development of Post-Secondary Online Degree Programs

    Science.gov (United States)

    Davis, Kirk Alan

    2011-01-01

    The purpose of this study was to analyze organizational learning and the facilitating factors and critical elements for development of post-secondary distance education and online degree programs at three universities in Hawaii: University of Hawaii at Hilo (public), Hawaii Pacific University and Chaminade University (both private). The researcher…

  16. Evaluability Assessment Thesis and Dissertation Studies in Graduate Professional Degree Programs

    Science.gov (United States)

    Walser, Tamara M.; Trevisan, Michael S.

    2016-01-01

    Evaluability assessment (EA) has potential as a design option for thesis and dissertation studies, serving as a practical training experience for both technical and nontechnical evaluation skills. Based on a content review of a sample of EA theses and dissertations from graduate professional degree programs, the authors of this article found that…

  17. Using the Wiimote to Learn MEMS in a Physics Degree Program

    Science.gov (United States)

    Sánchez-Azqueta, Carlos; Gimeno, Cecilia; Celma, Santiago; Aldea, Concepción

    2016-01-01

    This paper describes a learning experience designed to introduce students in a Micro- and Nanosystems course in a Physics Bachelor's degree program to the use of professional tools for the design and characterization of micro-electromechanical systems (MEMS) through a specific commercial case: the MEMS used by the well-known gaming platform…

  18. Students' Perceptions of Long-Functioning Cooperative Teams in Accelerated Adult Degree Programs

    Science.gov (United States)

    Favor, Judy

    2012-01-01

    This study examined 718 adult students' perceptions of long-functioning cooperative study teams in accelerated associate's, bachelor's, and master's business degree programs. Six factors were examined: attraction toward team, alignment of performance expectations, intrateam conflict, workload sharing, preference for teamwork, and impact on…

  19. Motivational Orientations of Non-Traditional Adult Students to Enroll in a Degree-Seeking Program

    Science.gov (United States)

    Francois, Emmanuel Jean

    2014-01-01

    The purpose of this research was to investigate the motivational orientations of non-traditional adult students to enroll in a degree-seeking program based on their academic goal. The Education Participation Scale (EPS) was used to measure the motivational orientations of participants. Professional advancement, cognitive interest, and educational…

  20. Determinants of Self-Reflective Learning and Its Consequences in Online Master Degree Programs

    Science.gov (United States)

    Neumann, Yoram; Neumann, Edith; Lewis, Shelia

    2017-01-01

    Based on recent studies of self-reflective learning and its effects on various learning outcomes, this study examined the concept of self-reflective learning in the context of the Robust Learning Model (RLM), which is a learning model designed for improving the educational effectiveness of online degree programs. Two models were introduced to…

  1. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  2. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  3. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  4. Mapping Dual-Degree Programs in Social Work and Public Health: Results From a National Survey

    Directory of Open Access Journals (Sweden)

    Dory Ziperstein

    2016-02-01

    Full Text Available Dramatic changes in the health system due to national health reform are raising important questions regarding the educational preparation of social workers for the new health arena. While dual-degree programs in public health and social work can be an important response to what is needed educationally, little is known about them. The National MSW/MPH Programs Study surveyed MSW/MPH program administrators to better understand the prevalence, models, structure, and challenges of these dual-degree programs. Forty-two programs were identified, and 97.6% of those contacted participated (n=41. Findings indicate that MSW/MPH programs are popular, increasing, geographically dispersed, and drawing talented students interested in trans-disciplinary public health social work practice. Challenges for these programs include the need for greater institutional support, particularly funding, and a general lack of best practices for MSW/MPH education. While findings from this study suggest graduates appear especially well-prepared for leadership and practice in the new health environment, additional research is needed to assess their particular contributions and career trajectories.

  5. [Public health competencies and contents in pharmacy degree programs in Spanish universities].

    Science.gov (United States)

    Lumbreras, Blanca; Davó-Blanes, María Carmen; Vives-Cases, Carmen; Bosch, Félix

    2015-01-01

    To identify public health core competencies and contents in pharmacy degrees at a meeting of public health lecturers in pharmacy degrees from various public and private universities. The first Meeting of the Forum of University Teaching Staff in Pharmacy Degrees was held at the Faculty of Medicine in the Complutense University, Madrid, Spain on the 19(th) and 20(th) of November 2013. The meeting was attended by 17 lecturers. Participants brought their own teaching programs and were given two previous studies on public health competencies for analysis of public health contents and competencies in pharmacy degrees. Working groups were formed and the results were shared. The highest number of core competencies was identified in the following functions: "Assessment of the population's health needs" and "Developing health policies". The final program included basic contents organized into 8 units: Concept of Public Health, Demography, Epidemiological Method, Environment and Health, Food Safety, Epidemiology of Major Health Problems, Health Promotion and Education, and Health Planning and Management. Representation of almost all the Spanish Pharmacy Faculties and the consensus reached in the description of competences and program contents will greatly improve the quality of teaching in this area. Copyright © 2014 SESPAS. Published by Elsevier Espana. All rights reserved.

  6. Experiences and emotions of faculty teaching in accelerated second baccalaureate degree nursing programs.

    Science.gov (United States)

    Brandt, Cheryl L; Boellaard, Melissa R; Zorn, Cecelia R

    2013-07-01

    The number of accelerated second baccalaureate degree nursing (ASBSN) programs has mushroomed over recent decades, with more than 225 currently in existence. Scholars have described students and programs, but research examining the faculty experience is limited. The purpose of this study was to describe the experiences and emotions of faculty teaching students in ASBSN programs. Using a descriptive qualitative survey design, faculty (N = 138) from 25 randomly selected programs in 11 midwestern states were surveyed using an instrument developed for this study and distributed online. Ten themes emerged, including (a) Engaging With Motivated, Mature, and Diverse Students, (b) Students Choosing Nursing for the "Wrong Reasons," (c) Too Much Work, Too Little Time for Students and Faculty, (d) Amazement, (e) Pride, and (f) Frustration. These findings will help novice and seasoned ASBSN faculty interpret their experiences, strengthen precepting and mentoring activities, and support administrators in determining staffing plans and designing ASBSN programs. Copyright 2013, SLACK Incorporated.

  7. Curriculum Evaluation and Employers Opinions: the case study of Educational Technology Program in Bachelor Degree (Continuing Program

    Directory of Open Access Journals (Sweden)

    Nakhon Lalognam

    2016-09-01

    Full Text Available The purposes of this research were: 1 to evaluate the Educational Technology Program (Continuing Program in Bachelor Degree curriculum which is revised in 2007 by applying CIPP model for evaluation. 2 to study the opinions of the employers about the ideal characteristics and actual characteristics of graduates. 3 to study the opinions for the requirements of the Educational Technology Program in Bachelor Degree (Continuing Program and knowledge implementation in work of graduates. 4 to make the suggestions and guidelines to improve the Educational Technology Program in Bachelor Degree (Continuing Program to achieve potentiality and responsive for the requirements of learners and employers. The sample of this research were 310 persons ; consisted of graduates in the Educational Technology Program in Bachelor Degree (Continuing Program in academic year 2006 - 2010, the committee of the Educational Technology Program in Bachelor Degree (Continuing Program , instructors and employers by using Multi-stage Random Sampling and Simple Random Sampling. The instruments of this research were the 5 levels rating scale questionnaire and the structured interview type. They consisted of 3 sets: 1 for graduates, 2 for the committee of the Educational Technology Program in Bachelor Degree (Continuing Program and 3 for instructors and employers. The research found that: 1. The results of evaluation on the Educational Technology Program in Bachelor Degree (Continuing Program which is revised in 2007 were: 1.1 The opinions of graduates to curriculum in all of aspects were average at the uncertain level which the context aspect was at the high level, input aspect was at the uncertain level, process aspect was at the uncertain level and product aspect was at the high level. 1.2 The opinions of the curriculum committee and instructors to curriculum in all of aspects were average at the high level which the context aspect was at the high level, input aspect was at the

  8. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  9. Pharmacoeconomics and outcomes research degree-granting PhD programs in the United States.

    Science.gov (United States)

    Slejko, Julia F; Libby, Anne M; Nair, Kavita V; Valuck, Robert J; Campbell, Jonathan D

    2013-01-01

    Evidence is missing on showcasing current practices of degree programs specific to the field of pharmaceutical outcomes research. To measure current practices of pharmacoeconomics and outcomes research PhD programs in the United States and synthesize recommendations for improving the success of programs and prospective students. A 23-question online survey instrument was created and distributed to 32 program directors identified in the International Society for Pharmacoeconomics and Outcomes Research educational directory. Descriptive statistics summarized both the program characteristics (including observed and desired number of faculty and students) and training recommendations (traits of program and student success). Of 30 eligible programs that conferred a PhD in pharmacoeconomics, pharmaceutical outcomes research, or a related field, 16 respondents (53%) completed the survey. Seventy-five percent of respondents were located in a school of pharmacy. The average observed number of faculty (7.5) and students (11.5) was lower than the average desired numbers (8.1) and (14.7), respectively. Reputation of faculty research and a collaborative environment with other disciplines were rated highest for a program's success. Faculty's mentoring experience and reputation and student funding opportunities were rated highest for prospective students' success. Existing and emerging programs as well as prospective students can use these findings to further their chances of success. Copyright © 2013 Elsevier Inc. All rights reserved.

  10. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  11. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  12. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-17

    ... number, 1-800-772-1213, or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0017] RIN 0960-AH00 Improvements to the Supplemental Security Income Program--Heroes Earnings Assistance and Relief Tax Act of 2008...

  13. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...

  14. Exploring social support and job satisfaction among associate degree program directors in California.

    Science.gov (United States)

    Mintz-Binder, Ronda D; Fitzpatrick, Joyce J

    2009-01-01

    A troubling trend noted in California has been an increase in the number of open positions for program directors of associate degree registered nursing (ADRN) programs. Positions remain open for extended periods of time, and the number of qualified applicants for such positions is insufficient. The loss of and ensuing slow replacement of ADRN program directors can put these programs in jeopardy of student admission suspension, or, worse yet, closure by the state nursing board. In this exploratory study, variables of social support and job satisfaction were studied. Variables were found to be limited opportunities for peer interaction, expressed discontent, and retention concerns. A significant positive relationship between job satisfaction and social support was noted. Recommendations for future research are offered.

  15. Evaluating the online platform of a blended-learning pharmacist continuing education degree program

    OpenAIRE

    Wilbur, Kerry

    2016-01-01

    Background: Distance-based continuing education opportunities are increasingly embraced by health professionals worldwide. Methods: To evaluate the online component of a blended-learning degree program for pharmacists, we conducted a structured self-assessment and peer review using an instrument systematically devised according to Moore’s principles of transactional distance. The web-based platform for 14 courses was reviewed by both local and external faculty, followed by shared reflecti...

  16. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  17. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    fuzzy logic, artificial neural networks and expert systems have been explored for static security assessment problems (Bansal et ..... MATLAB version 7.6 neural network toolbox was ..... Vision 2020 Dynamic Security Assessment in Real time.

  18. Enhancing Global Health Security: US Africa Command's Disaster Preparedness Program.

    Science.gov (United States)

    Morton Hamer, Melinda J; Reed, Paul L; Greulich, Jane D; Beadling, Charles W

    2018-03-07

    US Africa Command's Disaster Preparedness Program (DPP), implemented by the Center for Disaster and Humanitarian Assistance Medicine, partnered with US Government agencies and international organizations to promote stability and security on the African continent by engaging with African Partner Nations' (PN) civil and military authorities to improve disaster management capabilities. From 2008 to 2015, DPP conducted disaster preparedness and response programming with 17 PNs. DPP held a series of engagements with each, including workshops, strategic planning, developing preparedness and response plans, tabletop exercises, and prioritizing disaster management capability gaps identified through the engagements. DPP partners collected data for each PN to further capacity building efforts. Thus far, 9 countries have completed military pandemic plans, 10 have developed national pandemic influenza plans, 9 have developed military support to civil authorities plans, and 11 have developed disaster management strategic work plans. There have been 20 national exercises conducted since 2009. DPP was cited as key in implementation of Ebola response plans in PNs, facilitated development of disaster management agencies in DPP PNs, and trained nearly 800 individuals. DPP enhanced PNs' ability to prepare and respond to crises, fostering relationships between international agencies, and improving civil-military coordination through both national and regional capacity building. (Disaster Med Public Health Preparedness. 2018;page 1 of 11).

  19. Impetus and Creation of an Accelerated Second-Degree Baccalaureate Nursing Program Readmission Policy

    Directory of Open Access Journals (Sweden)

    Joanne Schwartz PhD, PMHNP-BC, CNE

    2017-04-01

    Full Text Available An accelerated second-degree baccalaureate nursing (ASDBN is an academic plan of study typically 12 to 24 months in duration. ASDBN students make many changes when entering this type of program. Some of the major changes ASDBN students make when entering an ASDBN program include leaving jobs, incurring debt, draining financial resources, forgoing time with children, spouses, and significant others, and, in some cases, relocating far from family and support systems. Because of the nature and scope of the many sacrifices ASDBN students typically make, academic program dismissal is particularly traumatic and devastating. It is not uncommon for an ASDBN student to seek program readmission when they are dismissed for academic reasons. Many academically dismissed ASDBN students seek program readmission. Administrators face a challenging decision in program readmission requests. The key issue with program readmission of ASDBN students is having a rigorous and comprehensive policy to determine which ASDBN students should be readmitted. This article examines one large, private, urban university’s ASDBN program’s readmission policy design and how the policy is applied to manage and determine ASDBN program readmission requests.

  20. The DNP/MPH Dual Degree: An Innovative Graduate Education Program for Advanced Public Health Nursing.

    Science.gov (United States)

    Shaw, Kathy; Harpin, Scott; Steinke, Geraldine; Stember, Marilyn; Krajicek, Marilyn

    2017-03-01

    Strong professional priorities, evolving Affordable Care Act requirements, and a significantly limited public health nursing workforce prompted the University of Colorado College of Nursing to collaborate with the School of Public Health to implement one of the first Doctor of Nursing Practice/Master of Public Health dual degree programs in the nation. Federal grant funding supported the development, implementation, and evaluation of this unique post-baccalaureate dual degree program, for which there were no roadmaps, models, or best practices to follow. Several key issues emerged that serve as lessons learned in creating a new, novel higher education pathway for Advanced Public Health Nursing. This paper highlights two of those: (1) marketing, admission, and matriculation across two programs, and (2) enhancing curricula through distance coursework and interprofessional education. When collaboration with a school of public health is possible, the Doctor of Nursing Practice/Master of Public Health dual degree is an efficient way to prepare public health nurses' with the highest level of public health knowledge, practice, and leadership expertise. © 2016 Wiley Periodicals, Inc.

  1. Marketing Online Degree Programs: How Do Traditional-Residential Programs Compete?

    Science.gov (United States)

    Adams, Jonathan; Eveland, Vicki

    2007-01-01

    A total of 150 university Web sites were segregated into one of three groups: accredited residential, regionally accredited online, and nonaccredited online institutions. The promotional imagery, marketing messages and marketing themes found on the landing pages of each university program Web sites were analyzed for similarities and differences. A…

  2. I and C security program for nuclear facilities: implementation guide - TAFICS/IG/2

    International Nuclear Information System (INIS)

    2016-04-01

    This is the second in a series of documents being developed by TAFICS for protecting computer-based I and C systems of Indian nuclear facilities from cyber attacks. The document provides guidance to nuclear facility management to establish, implement and maintain a robust I and C security program - consisting of security plan and a set of security controls. In order to provide a firm basis for the security program, the document also identifies the fundamental security principles and foundational security requirements related to computer-based I and C systems of nuclear facilities. It is recommended that all applicable Indian nuclear facilities should implement the security program - with required adaptation - so as to provide the necessary assurance that the I and C systems are adequately protected against cyber attacks. (author)

  3. Results of a Master's degree program for high-school teachers

    Science.gov (United States)

    Cocke, W. J.

    1993-05-01

    Starting in the summer of 1990, the Astronomy Department at the University of Arizona began a 3-year summer program for upgrading the skills of high-school and middle-school science teachers. The program granted Master's degrees in Astronomy to the 33 teachers that completed the program this past summer. The teachers received tuition waivers and stipends to cover living expenses. The funding came mostly from the National Science Foundation, but the University of Arizona cost-shared at the 15% level. About half of the teachers were from Arizona, and the rest came from out-of-state. Although minorities were encouraged to apply, we had few minority applicants, and there were no Afro-Americans and only one Hispanic in the program. The content of the courses was heavily slanted towards mathematics and the physical sciences. The math level went up to vector calculus and linear partial differential equations, and there was a heavy emphasis on physics and astrophysics. Astronomy turned out to be a good umbrella under which to strengthen the teachers' knowledge of the physical sciences. One of the weak points in the program was the pace at which we introduced new material to the teachers. The summer sessions were short and very intense, and the teachers often found themselves with insufficient time to digest the information. This was offset to some degree by the high rate of cooperative learning that the teachers exhibited. The program seems to have been a great success, and the teachers report that their higher level of understanding is very useful to them in the classroom, and the astronomy content provided an excellent source of new demonstrations and projects. We present the results of a final survey, in which we ask the teachers to summarize their thoughts about the program and its effectiveness.

  4. Applying the National Industrial Security Program (NISP) in the laboratory environment

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1995-01-01

    With continuing changes in the world safeguards and security environment the effectiveness of many laboratory operations depends on correctly assessing the risk to its programs and developing protection technologies, research and concepts of operations being employed by the scientific community. This paper explores the opportunities afforded by the National Industrial Security Program (NISP) to uniformly and simply protect Laboratory security assets, sensitive and classified information and matter, during all aspects of a laboratory program. The developments in information systems, program security, physical security and access controls suggest an industrial security approach. This paper's overall objective is to indicate that the Laboratory environment is particularly well suited to take advantage being pursued by NISP and the performance objectives of the new DOE orders

  5. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    International Nuclear Information System (INIS)

    Song, S. H.; Lee, M. S.; Kim, T. H.; Park, C. H.; Park, S. P.; Kim, H. S.

    2014-01-01

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system

  6. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Song, S. H. [Korea University, Seoul (Korea, Republic of); Lee, M. S.; Kim, T. H. [Formal Work Inc., Seoul (Korea, Republic of); Park, C. H. [LINE Corp., Tokyo (Japan); Park, S. P. [Ahnlab Inc., Seoul (Korea, Republic of); Kim, H. S. [Sejong University, Seoul (Korea, Republic of)

    2014-08-15

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system.

  7. The Development of a Program of Study for a Bachelor's Degree in Early Childhood Education in Belize

    Science.gov (United States)

    Mendez Valladares, Melissa Dilieth

    2017-01-01

    Presently, the highest degree a person interested in teaching at the early childhood level in Belize is the Associate's Degree in Early Childhood Education. The purpose of this project was to design a program of undergraduate coursework in the area of teacher preparation that will meet university qualifications for a Bachelor's Degree in Early…

  8. Design and Assessment of an Associate Degree-Level Plant Operations Technical Education Program

    Science.gov (United States)

    Selwitz, Jason Lawrence

    Research was undertaken to develop and evaluate an associate degree-level technical education program in Plant Operations oriented towards training students in applied science, technology, engineering, and mathematics (STEM) skills and knowledge relevant to a spectrum of processing industries. This work focuses on four aspects of the curriculum and course development and evaluation research. First, the context of, and impetus for, what was formerly called vocational education, now referred to as technical or workforce education, is provided. Second, the research that was undertaken to design and evaluate an associate degree-level STEM workforce education program is described. Third, the adaptation of a student self-assessment of learning gains instrument is reviewed, and an analysis of the resulting data using an adapted logic model is provided, to evaluate the extent to which instructional approaches, in two process control/improvement-focused courses, were effective in meeting course-level intended learning outcomes. Finally, eight integrative multiscale exercises were designed from two example process systems, wastewater treatment and fast pyrolysis. The integrative exercises are intended for use as tools to accelerate the formation of an operator-technician's multiscale vision of systems, unit operations, underlying processes, and fundamental reactions relevant to multiple industries. Community and technical colleges serve a vital function in STEM education by training workers for medium- and high-skilled technical careers and providing employers the labor necessary to operate and maintain thriving business ventures. Through development of the curricular, course, and assessment-related instruments and tools, this research helps ensure associate degree-level technical education programs can engage in a continual process of program evaluation and improvement.

  9. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  10. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  11. Attitudes and Perceptions of Dual PharmD/MBA Degree Program Students.

    Science.gov (United States)

    Jacobs, David M; Daly, Christopher J; Tierney, Sarah-Elizabeth L; O'Brien, Erin; Fiebelkorn, Karl D

    2017-05-01

    Objectives. To understand pharmacy students' reasons for pursuing a dual PharmD/MBA degree and their perceptions of the impact a dual degree will have on their careers. Methods. This was a cross-sectional survey of registered students in the University at Buffalo PharmD/MBA program. An electronic survey was developed through collaboration with the UB School of Management and administered in January 2015. Results. A total of 23/24 (96% response rate) students who were enrolled in the PharmD/MBA curriculum responded to the survey. Respondents identified employment opportunities following graduation and career advancement as the most influential determinants in deciding to pursue an MBA degree. All respondents (100%) felt the job marketplace for pharmacy graduates is becoming increasingly difficult, 96% believe they will earn a higher midpoint salary with a PharmD/MBA, and 82% would recommend a PharmD/MBA to first year pharmacy students. Conclusion. Students are increasingly perceptive of the challenges in the current job marketplace and are taking advantage of a dual PharmD/MBA degree.

  12. A Phenomenological Study of the Lived Experiences of Digital Immigrants in a Fully Online Master's Degree Program

    Science.gov (United States)

    Kieschnick, Stuart

    2012-01-01

    This qualitative study was designed to investigate the challenges encountered and support systems needed by digital immigrants enrolled in an online master's degree program. Participants were digital immigrants who were born before 1980 and enrolled or recently graduated from an online master's degree program. Survey data and demographic data were…

  13. The New Sphere of International Student Education in Chinese Higher Education: A Focus on English-Medium Degree Programs

    Science.gov (United States)

    Kuroda, Chiharu

    2014-01-01

    This empirical study explores the current features of English-medium instructed master's degree programs for international students (EMIMDPs-ISs) in Chinese higher education. Since the mid-2000s, a significant number of Chinese universities have proactively engaged in establishing English-medium instructed degree programs for international…

  14. Quality Assurance of Joint Degree Programs from the Perspective of Quality Assurance Agencies: Experience in East Asia

    Science.gov (United States)

    Hou, Yung-Chi; Ince, Martin; Tsai, Sandy; Wang, Wayne; Hung, Vicky; Lin Jiang, Chung; Chen, Karen Hui-Jung

    2016-01-01

    Joint degree programs have gained popularity in East Asia, due to the growth of transnational higher education in the region since 2000. However, the external quality assurance (QA) and accreditation of joint degree programs is a challenge for QA agencies, as it normally involves the engagement of several institutions and multiple national…

  15. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  16. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  17. Comparative Analysis of Curricula for Bachelor's Degree in Cyber Security in the USA and Ukraine

    Science.gov (United States)

    Bystrova, Bogdana

    2017-01-01

    At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…

  18. Joint MS Degree Program between the Korea University of Technology and Education and the University of Kansas

    Science.gov (United States)

    Dougherty, R. L.; Kim, Kwang Su

    This paper provides an overview of the Joint MS Degree Program between Korea University of Technology and Education’ s (KUT) Mechatronics Department and Kansas University’ s (KU) Mechanical Engineering Department. Discussions were initiated in early 2005 which resulted in a formal agreement being approved by both parties in mid-2007. The Joint MS Degree Program is composed of 30 semester credit hours, equally split between the two universities, with the actual degree being awarded by the institution at which the thesis work is performed. Issues addressed during the development of this Joint MS Program included: joint versus dual degrees, institutional acceptance of the transfer of fifteen hours of credit for an MS degree, different admissions requirements and procedures for the two institutions, financial support of the students, faculty advisors at each institution, Graduate Directors at each institution, transcript acknowledgement of the Joint Degree, residency requirements, English speaking requirements/abilities, thesis publication allowances/requirements, and time zone differences for virtual meetings. These issues have been addressed, and the Joint MS Degree Program is functioning with a small number of students having taken advantage of the opportunity since the Program’ s inception. Future considerations are: growing the number of students in the Program, expansion to other Departments besides KU-Mechanical Engineering and KUTMechatronics, including other universities in the Program, expansion to a Joint PhD Degree Program, and stronger funding resources.

  19. Establishing cyber security programs for I and C systems at nuclear facilities

    International Nuclear Information System (INIS)

    Waedt, Karl

    2012-01-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  20. Establishing cyber security programs for I and C systems at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Waedt, Karl [AREVA NP GmbH (Germany)

    2012-11-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  1. An Enterprise Security Program and Architecture to Support Business Drivers

    Directory of Open Access Journals (Sweden)

    Brian Ritchot

    2013-08-01

    Full Text Available This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropriate. Through a discussion of information assurance, this article makes a case for leveraging enterprise security architectures to meet an organizations' need for information assurance. The approach is derived from the Sherwood Applied Business Security Architecture (SABSA methodology, as put into practice by Seccuris Inc., an information assurance integrator. An understanding of Seccuris’ approach will illustrate the importance of aligning security activities with high-level business objectives while creating increased awareness of the duality of risk. This business-driven approach to enterprise security architecture can help organizations change the perception of IT security, positioning it as a tool to enable and assure business success, rather than be perceived as an obstacle to be avoided.

  2. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  3. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  4. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    Science.gov (United States)

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  5. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-04-06

    ... Top Secret; Communications Security, except classified keys used for data transfer; Restricted Data... clearance under an SSA to Top Secret unless an approved NID covering the prospective Top Secret access has...

  6. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  7. Zero based programming: a viable security budgeting approach.

    Science.gov (United States)

    Roll, Frederick G

    2003-01-01

    To get additional dollars or avoid budget cuts or personnel reductions, healthcare security directors should consider a budget approach that best justifies the needs of the department or organization.

  8. An Enterprise Security Program and Architecture to Support Business Drivers

    OpenAIRE

    Brian Ritchot

    2013-01-01

    This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropr...

  9. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  10. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  11. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  12. Considerations for The Instruction Of Research Methodologies In Graduate-Level Distance Education Degree Programs

    Directory of Open Access Journals (Sweden)

    M. Cleveland-INNERS

    2004-04-01

    Full Text Available Considerations for The Instruction Of Research Methodologies In Graduate-Level Distance Education Degree Programs Tom JONES, Ph.D. Associate Professor Centre for Distance Education Athabasca University, CANADA M. Cleveland-INNERS, Ph.D. Assistant Professor Centre for Distance Education Athabasca University, CANADA ABSTRACT The growth of basic and applied research activity in distance education requires redirection on several fronts, including the instruction of research methods in the education of graduate students. The majority of graduate students in distance education are practitioners whose goals range from carrying out original research to acquiring the concepts and skills necessary to become a practitioner. We argue that the best foundation for achieving both of those goals in distance education is developed by means of an understanding and internalization of sound research design methodologies, primarily acquired by formal instruction, and that an emphasis on research in graduate programs in distance education will encourage theory development. This paper presents the rationale for a general curricular model that attempts to address the sets of research competencies for graduate students in graduate-level distance education programs while at the same time moving students toward an appreciation and understanding of the epistemological foundations for social science research.

  13. Degrees of Difference: Gender Segregation of U.S. Doctorates by Field and Program Prestige

    Directory of Open Access Journals (Sweden)

    Kim A. Weeden

    2017-02-01

    Full Text Available Women earn nearly half of doctoral degrees in research fields, yet doctoral education in the United States remains deeply segregated by gender. We argue that in addition to the oft-noted segregation of men and women by field of study, men and women may also be segregated across programs that differ in their prestige. Using data on all doctorates awarded in the United States from 2003 to 2014, field-specific program rankings, and field-level measures of math and verbal skills, we show that (1 "net" field segregation is very high and strongly associated with field-level math skills; (2 "net" prestige segregation is weaker than field segregation but still a nontrivial form of segregation in doctoral education; (3 women are underrepresented among graduates of the highest-and to a lesser extent, the lowest-prestige programs; and (4 the strength and pattern of prestige segregation varies substantially across fields, but little of this variation is associated with field skills.

  14. 78 FR 35945 - Request for Comments on Security Training Programs for Surface Mode Employees

    Science.gov (United States)

    2013-06-14

    ... million for training projects. Similarly, under the Intercity Bus Security Grant Program (IBSGP), which... related to the security elements in Table 1, per employee? (Please indicate whether this includes travel... on the size and scope of the exercise, including the phases of an exercise, travel expenses for...

  15. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  16. The effectiveness of online gaming as part of a security awareness program

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2014-07-01

    Full Text Available the human element whose actions can be considered as erratic and unpredictable thus posing a threat to the security of the organization. Security awareness programs aim to equip users of cyberspace with the necessary knowledge to identify and mitigate...

  17. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  18. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  19. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  20. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, Doris E.

    2005-01-01

    In support of the US Government and the International Atomic Energy Agency (IAEA) Nuclear Security Programmes, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been implemented as the basis for a performance methodology for the design and evaluation of Physical Protection Systems against a Design Basis Threat (DBT) for theft or sabotage of nuclear and/or radiological materials. Since integrated systems must include people as well as technology and the man-machine interface, a critical aspect of the human element is to train all stakeholders in nuclear security on the systems approach. Current training courses have been beneficial but are still limited in scope. SNL has developed two primary international courses and is completing development of three new courses that will be offered and presented in the near term. In the long-term, SNL envisions establishing a comprehensive nuclear security training curriculum that will be developed along with a series of forthcoming IAEA Nuclear Security Series guidance documents.

  1. Effects of Video Game-Based Instruction on Writing Achievement and Motivation in Postsecondary Accelerated Degree Programs

    Science.gov (United States)

    Lee, Michael C.

    2017-01-01

    The purpose of this quantitative experimental posttest-only control group research study was to determine the degree to which differences exist in outcomes between students using a video game-based instruction and students using a traditional non-video game-based instruction in accelerated degree program courses at a 4-year university in Illinois…

  2. Evaluating the online platform of a blended-learning pharmacist continuing education degree program.

    Science.gov (United States)

    Wilbur, Kerry

    2016-01-01

    Distance-based continuing education opportunities are increasingly embraced by health professionals worldwide. To evaluate the online component of a blended-learning degree program for pharmacists, we conducted a structured self-assessment and peer review using an instrument systematically devised according to Moore's principles of transactional distance. The web-based platform for 14 courses was reviewed by both local and external faculty, followed by shared reflection of individual and aggregate results. Findings indicated a number of course elements for modification to enhance the structure, dialog, and autonomy of the student learning experience. Our process was an important exercise in quality assurance and is worthwhile for other health disciplines developing and delivering distance-based content to pursue.

  3. Evaluating the online platform of a blended-learning pharmacist continuing education degree program

    Directory of Open Access Journals (Sweden)

    Kerry Wilbur

    2016-06-01

    Full Text Available Background: Distance-based continuing education opportunities are increasingly embraced by health professionals worldwide. Methods: To evaluate the online component of a blended-learning degree program for pharmacists, we conducted a structured self-assessment and peer review using an instrument systematically devised according to Moore's principles of transactional distance. The web-based platform for 14 courses was reviewed by both local and external faculty, followed by shared reflection of individual and aggregate results. Results: Findings indicated a number of course elements for modification to enhance the structure, dialog, and autonomy of the student learning experience. Conclusion: Our process was an important exercise in quality assurance and is worthwhile for other health disciplines developing and delivering distance-based content to pursue.

  4. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  5. Security, Dignity, Caring Relationships, and Meaningful Work: Needs Motivating Participation in a Job-Training Program

    Science.gov (United States)

    Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David

    2008-01-01

    Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…

  6. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    Science.gov (United States)

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  7. Design of large scale applications of secure multiparty computation : secure linear programming

    NARCIS (Netherlands)

    Hoogh, de S.J.A.

    2012-01-01

    Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allows a set of mutually distrusting parties to perform a computation on their private information in such a way that as little as possible is revealed about each private input. The early results of

  8. In Pursuit of the American Degree: Internationalization, National Security, and the Making of South Asian Foreign Students

    Science.gov (United States)

    Thomas, Susan

    2013-01-01

    My dissertation examines how global neoliberal forces intersect with racialized state security practices to shape the transnational subjectivities of South Asian overseas students studying in the U.S. in the post-9/11 moment. These students' movement across national borders to pursue higher education in the United States positions them as ideal…

  9. Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    NARCIS (Netherlands)

    Pettorossi, Alberto; Delzanno, Giorgio; Etalle, Sandro

    2001-01-01

    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder

  10. Determining the degree of powder homogeneity using PC-based program

    Directory of Open Access Journals (Sweden)

    Đuragić Olivera M.

    2010-01-01

    Full Text Available The mixing of powders and the quality control of the obtained mixtures are critical operations involved in the processing of granular materials in chemical, metallurgical, food and pharmaceutical industries. Studies on mixing efficiency and the time needed for achieving homogeneity in the powder mashes production have significant importance. Depending on the characteristic of the materials, a number of methods have been used for the homogeneity tests. Very often, the degree of mixing has been determined by analyzing images of particle arrays in the sample using microscopy, photography and/or video tools. In this paper, a new PC-based method for determining the number of particles in the powder homogeneity tests has been developed. Microtracers®, red iron particles, were used as external tracer added before mixing. Iron particles in the samples of the mixtures were separated by rotary magnet and spread onto a filter paper. The filter paper was sprayed with 50% solution of ethanol for color development and the particles counted where the number of spots presented the concentration of added tracer. The number of spots was counted manually, as well as by the developed PC program. The program which analyzes scanned filter papers with spots is based on digital image analyses, where red spots were converted through few filters into a black and white, and counted. Results obtained by manual and PC counting were compared. A high correlation was established between the two counting methods.

  11. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  12. Strong tobacco control program requirements and secure funding are not enough: lessons from Florida.

    Science.gov (United States)

    Kennedy, Allison; Sullivan, Sarah; Hendlin, Yogi; Barnes, Richard; Glantz, Stanton

    2012-05-01

    Florida's Tobacco Pilot Program (TPP; 1998-2003), with its edgy Truth media campaign, achieved unprecedented youth smoking reductions and became a model for tobacco control programming. In 2006, 3 years after the TPP was defunded, public health groups restored funding for tobacco control programming by convincing Florida voters to amend their constitution. Despite the new program's strong legal structure, Governor Charlie Crist's Department of Health implemented a low-impact program. Although they secured the program's strong structure and funding, Florida's nongovernmental public health organizations did not mobilize to demand a high-impact program. Implementation of Florida's Amendment 4 demonstrates that a strong programmatic structure and secure funding are insufficient to ensure a successful public health program, without external pressure from nongovernmental groups.

  13. Why are you here? Needs analysis of an interprofessional health-education graduate degree program

    Directory of Open Access Journals (Sweden)

    Cable C

    2014-04-01

    Full Text Available Christian Cable,1,2 Mary Knab,3,4 Kum Ying Tham,5,6 Deborah D Navedo,3 Elizabeth Armstrong3,7,81Scott and White Healthcare, Temple, 2Texas A&M University Health Science Center, TAMHSC College of Medicine, Bryan, TX, 3MGH Institute of Health Professions, 4Physical and Occupational Therapy Services Department, Massachusetts General Hospital, Boston, MA, USA; 5Emergency Department, Tan Tock Seng Hospital, 6Lee Kong Chian School of Medicine, Nanyang Technological University, Singapore; 7Harvard Macy Institute, 8Department of Pediatrics, Harvard Medical School, Boston, MA, USAAbstract: Little is known about the nature of faculty development that is needed to meet calls for a focus on quality and safety with particular attention to the power of interprofessional collaborative practice. Through grounded-theory methodology, the authors describe the motivation and needs of 20 educator/clinicians in multiple disciplines who chose to enroll in an explicitly interprofessional master's program in health profession education. The results, derived from axial coding described by Strauss and Corbin, revealed that faculty pursue such postprofessional master's degrees out of a desire to be better prepared for their roles as educators. A hybrid-delivery model on campus and online provided access to graduate degrees while protecting the ability of participants to remain in current positions. The added benefit of a community of practice related to evidence-based and innovative models of education was valued by participants. Authentic, project-based learning and assessment supported their advancement in home institutions and systems. The experience was described by participants as a disruptive innovation that helped them attain their goal of leadership in health profession education.Keywords: health education

  14. A Study on the Prevalence and Correlates of Academic Dishonesty in Four Undergraduate Degree Programs

    Directory of Open Access Journals (Sweden)

    Mark Anthony Mujer Quintos

    2017-02-01

    Full Text Available With college students from four different disciplines representing the humanities as well as the natural, mathematical, and social sciences as respondents, this study determined the degree of prevalence and correlates of academic dishonesty among students. A survey questionnaire about the respondents’ personal characteristics and their frequency of engagement in academic dishonesty during one whole academic year (two semesters was used as the research instrument. A Wilcoxon Signed-Ranks test was used to determine which between cheating on examinations, quizzes and/or exercises and cheating on papers and/or projects was committed more often. Spearman’s Rank Correlation tests were conducted to determine significant correlations between the students’ characteristics and academic dishonesty. The study found that within an academic year, nine out of ten students have engaged in at least one act of academic dishonesty. Furthermore, students engaged in more types of academic cheating on papers/projects than on exams/quizzes/exercises. The most prevalent form of academic dishonesty was connivance through the sharing between students of answers and questions to an exam/quiz/exercise that a student has taken before and the others are just about to take. Cheating on papers/projects was committed more often than on exams/quizzes/exercises for all degree programs except for mathematical science students. Only two variables, (1 perception of one’s classmates’ and peers’ frequency of academic cheating and (2 frequency of academic cheating during high school, have moderately strong positive correlations with academic dishonesty. The attitude that academic cheating is never justified, on the other hand, was found to have a moderately strong negative correlation with academic dishonesty

  15. The Labor Market Outcomes of Two Forms of Cross-Border Higher Education Degree Programs between Malaysia and Japan

    Science.gov (United States)

    Koda, Yoshiko; Yuki, Takako

    2013-01-01

    This paper examines the labor market outcomes of two different forms of cross-border higher education degree programs (i.e., study abroad vs. twinning) between Malaysia and Japan. Based on a new graduate survey, it examines whether there are differences in the labor market outcomes between the two programs and what other factors have significant…

  16. Marketing Medical Education: An Examination of Recruitment Web Sites for Traditional and Combined-Degree M.D. Programs

    Science.gov (United States)

    Schneider, Roberta L.

    2004-01-01

    The Internet has the potential to reshape college recruiting; however, little research has been done to see the impact of the Internet on marketing graduate programs, including medical schools. This paper explores the Web sites of 20 different medical schools, including traditional four-year and bachelor's-M.D. degree programs, to ascertain…

  17. Diamond High Assurance Security Program: Trusted Computing Exemplar

    Science.gov (United States)

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  18. Establishing a national biological laboratory safety and security monitoring program.

    Science.gov (United States)

    Blaine, James W

    2012-12-01

    The growing concern over the potential use of biological agents as weapons and the continuing work of the Biological Weapons Convention has promoted an interest in establishing national biological laboratory biosafety and biosecurity monitoring programs. The challenges and issues that should be considered by governments, or organizations, embarking on the creation of a biological laboratory biosafety and biosecurity monitoring program are discussed in this article. The discussion focuses on the following questions: Is there critical infrastructure support available? What should be the program focus? Who should be monitored? Who should do the monitoring? How extensive should the monitoring be? What standards and requirements should be used? What are the consequences if a laboratory does not meet the requirements or is not willing to comply? Would the program achieve the results intended? What are the program costs? The success of a monitoring program can depend on how the government, or organization, responds to these questions.

  19. Development and Implementation of Degree Programs in Electric Drive Vehicle Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ng, Simon [Wayne State Univ., Detroit, MI (United States)

    2013-09-30

    The Electric-drive Vehicle Engineering (EVE) MS degree and graduate certificate programs have been continuing to make good progress, thanks to the funding and the guidance from DOE grant management group, the support from our University and College administrations, and to valuable inputs and feedback from our Industrial Advisory Board as well as our project partners Macomb Community College and NextEnergy. Table 1 below lists originally proposed Statement of Project Objectives (SOPO), which have all been completed successfully. Our program and course enrollments continue to be good and increasing, as shown in later sections. Our graduating students continue to get good job offers from local EV-related companies. Following the top recommendation from our Industrial Advisory Board, we were fortunate enough to be accepted into the prestigious EcoCAR2 (http://www.ecocar2.org/) North America university design competition, and have been having some modest success with the competition. But most importantly, EcoCAR2 offers the most holistic educational environment for integrating real-world engineering and design with our EVE graduate curriculum. Such integrations include true real-world hands-on course projects based on EcoCAR2 related tasks for the students, and faculty curricular and course improvements based on lessons and best practices learned from EcoCAR2. We are in the third and last year of EcoCAR2, and we have already formed a core group of students in pursuit of EcoCAR”3”, for which the proposal is due in early December.

  20. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  1. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  2. Measuring the Effect of Supplemental Nutrition Assistance Program (SNAP) Participation on Food Security.

    OpenAIRE

    James Mabli; Jim Ohls; Lisa Dragoset; Laura Castner; Betsy Santos

    2013-01-01

    The Supplemental Nutrition Assistance Program (SNAP) provides food assistance to more than 47 million low-income Americans every month. It aims to reduce hunger by facilitating beneficiaries’ access to enough food for a healthy, active lifestyle, otherwise known as "food security." Our study conducted for the Food and Nutrition Service of the U.S. Department of Agriculture shows that SNAP participation is associated with improved food security. The study is the largest and most rigorous one...

  3. Secure Programming Cookbook for C and C++ Recipes for Cryptography, Authentication, Input Validation & More

    CERN Document Server

    Viega, John

    2009-01-01

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

  4. Innovative Mobile Robot Method: Improving the Learning of Programming Languages in Engineering Degrees

    Science.gov (United States)

    Ortiz, Octavio Ortiz; Pastor Franco, Juan Ángel; Alcover Garau, Pedro María; Herrero Martín, Ruth

    2017-01-01

    This paper describes a study of teaching a programming language in a C programming course by having students assemble and program a low-cost mobile robot. Writing their own programs to define the robot's behavior raised students' motivation. Working in small groups, students programmed the robots by using the control structures of structured…

  5. Degree program changes and curricular flexibility: Addressing long held beliefs about student progression

    Science.gov (United States)

    Ricco, George Dante

    In higher education and in engineering education in particular, changing majors is generally considered a negative event - or at least an event with negative consequences. An emergent field of study within engineering education revolves around understanding the factors and processes driving student changes of major. Of key importance to further the field of change of major research is a grasp of large scale phenomena occurring throughout multiple systems, knowledge of previous attempts at describing such issues, and the adoption of metrics to probe them effectively. The problem posed is exacerbated by the drive in higher education institutions and among state legislatures to understand and reduce time-to-degree and student attrition. With these factors in mind, insights into large-scale processes that affect student progression are essential to evaluating the success or failure of programs. The goals of this work include describing the current educational research on switchers, identifying core concepts and stumbling blocks in my treatment of switchers, and using the Multiple Institutional Database for Investigating Engineering Longitudinal Development (MIDFIELD) to explore how those who change majors perform as a function of large-scale academic pathways within and without the engineering context. To accomplish these goals, it was first necessary to delve into a recent history of the treatment of switchers within the literature and categorize their approach. While three categories of papers exist in the literature concerning change of major, all three may or may not be applicable to a given database of students or even a single institution. Furthermore, while the term has been coined in the literature, no portable metric for discussing large-scale navigational flexibility exists in engineering education. What such a metric would look like will be discussed as well as the delimitations involved. The results and subsequent discussion will include a description of

  6. Seluge++: a secure over-the-air programming scheme in wireless sensor networks.

    Science.gov (United States)

    Doroodgar, Farzan; Abdur Razzaque, Mohammad; Isnin, Ismail Fauzi

    2014-03-11

    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  7. What You Should Get from a Professionally Oriented Master's Degree Program in Technical Communication.

    Science.gov (United States)

    Carliner, Saul

    1992-01-01

    Cites reasons for pursuing a curriculum in technical communication, lists objectives a program should achieve, and outlines a four-part program that includes theory, professional skills, technical proficiency, and an internship. Lists schools offering programs in technical communication. (SR)

  8. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  9. Discerning Quality Evaluation in Online Graduate Degree Programs in Agricultural Sciences and Engineering

    Science.gov (United States)

    Downs, Holly A.

    2011-01-01

    Enormous demands for online degrees in higher education have increased the pressure on universities to launch web courses and degrees quickly and, at times, without properly attending to the quality of these ventures. There is scarce research that defines which quality indicators are used to assess cyberlearning environments, how different…

  10. Equitably Distributing Quality of Marine Security Guards Using Integer Programming

    Science.gov (United States)

    2013-03-01

    ARB BALMOD COM DoD DoS E HAF HQ 10 IP IQ LP MOS MCESG MSG MSGAT NLP NMC OSAB PCS PP&O Q RSO SAl SD SE SNCO T-ODP LIST OF...and Eurasia 2 Abu Dhabi, United Arab Emirates India and the Middle East 3 Bangkok, Thailand East Asia and Pacific 4 Fort Lauderdale, Florida South...integer, goal, and quadratic programming. LP models and nonlinear programming ( NLP ) models are very similar in model development for both maximizing

  11. 78 FR 51192 - Secure Supply Chain Pilot Program

    Science.gov (United States)

    2013-08-20

    ... importers that volunteer to participate in partnership programs for highly compliant companies and pass a... to share the names of the participants and information related to these companies with other Federal... Letter, Cyber Letter, or Warning Letter, that cite violations of the Federal Food, Drug, and Cosmetic Act...

  12. Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques

    Directory of Open Access Journals (Sweden)

    T. R. Khabibullin

    2012-09-01

    Full Text Available The article reviews the most common mistakes made by developers when writing software for mobile platforms which lead to appearing vulnerabilities that allow attackers to perform various types of attacks. The basic principles of defensive programming are presented.

  13. Innovating in Health Care Management Education: Development of an Accelerated MBA and MPH Degree Program at Yale

    Science.gov (United States)

    Forman, Howard P.; Pistell, Anne F.; Nembhard, Ingrid M.

    2015-01-01

    Increasingly, there is recognition of the need for individuals with expertise in both management and public health to help health care organizations deliver high-quality and cost-effective care. The Yale School of Public Health and Yale School of Management began offering an accelerated Master of Business Administration (MBA) and Master of Public Health (MPH) joint degree program in the summer of 2014. This new program enables students to earn MBA and MPH degrees simultaneously from 2 fully accredited schools in 22 months. Students will graduate with the knowledge and skills needed to become innovative leaders of health care organizations. We discuss the rationale for the program, the developmental process, the curriculum, benefits of the program, and potential challenges. PMID:25706023

  14. Innovating in health care management education: development of an accelerated MBA and MPH degree program at Yale.

    Science.gov (United States)

    Pettigrew, Melinda M; Forman, Howard P; Pistell, Anne F; Nembhard, Ingrid M

    2015-03-01

    Increasingly, there is recognition of the need for individuals with expertise in both management and public health to help health care organizations deliver high-quality and cost-effective care. The Yale School of Public Health and Yale School of Management began offering an accelerated Master of Business Administration (MBA) and Master of Public Health (MPH) joint degree program in the summer of 2014. This new program enables students to earn MBA and MPH degrees simultaneously from 2 fully accredited schools in 22 months. Students will graduate with the knowledge and skills needed to become innovative leaders of health care organizations. We discuss the rationale for the program, the developmental process, the curriculum, benefits of the program, and potential challenges.

  15. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  16. Solving the Fully Fuzzy Bilevel Linear Programming Problem through Deviation Degree Measures and a Ranking Function Method

    OpenAIRE

    Aihong Ren

    2016-01-01

    This paper is concerned with a class of fully fuzzy bilevel linear programming problems where all the coefficients and decision variables of both objective functions and the constraints are fuzzy numbers. A new approach based on deviation degree measures and a ranking function method is proposed to solve these problems. We first introduce concepts of the feasible region and the fuzzy optimal solution of a fully fuzzy bilevel linear programming problem. In order to obtain a fuzzy optimal solut...

  17. TRANSPETRO gas security of supply program; Programa de confiabilidade de suprimento de gas natural da TRANSPETRO

    Energy Technology Data Exchange (ETDEWEB)

    Faertes, Denise [PETROBRAS Transporte S.A. (TRANSPETRO), Rio de Janeiro, RJ (Brazil)

    2005-07-01

    The purpose of this paper is to present the Gas Security of Supply Program that is being implemented at TRANSPETRO since 2002. It includes the application of the state of the art techniques and models related to reliability engineering. The main objective of the program is to evaluate and optimize overall gas network performance and to provide gas to different consumers (industrial, residential, thermo-plants and vehicles) in compliance with stated reliability levels. Heavy fines will be applied to PETROBRAS in case of occurrence of shortfalls. We hope that this paper can contribute to a wider discussion about this subject of performance indicators involving security of supply, safety and environment preservation. (author)

  18. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  19. Users manual for Aerospace Nuclear Safety Program six-degree-of-freedom reentry simulation (TMAGRA6C)

    International Nuclear Information System (INIS)

    Sharbaugh, R.C.

    1990-02-01

    This report documents the updated six-degree-of-freedom reentry simulation TMAGRA6C used in the Aerospace Nuclear Safety Program, ANSP. The simulation provides for the inclusion of the effects of ablation on the aerodynamic stability and drag of reentry bodies, specifically the General Purpose Heat Source, GPHS. The existing six-degree-of-freedom reentry body simulations (TMAGRA6A and TMAGRA6B) used in the JHU/APL Nuclear Safety Program do not include aerodynamic effects resulting from geometric changes to the configuration due to ablation from reentry flights. A wind tunnel test was conducted in 1989 to obtain the effects of ablation on the hypersonic aerodynamics of the GPHS module. The analyzed data were used to form data sets which are included herein in tabular form. These are used as incremental aerodynamic inputs in the new TMAGRA6C six-degree-of-freedom reentry simulation. 20 refs., 13 figs., 2 tabs

  20. Distance Education in Dental Hygiene Bachelor of Science Degree Completion Programs: As Perceived by Students and Faculty

    Science.gov (United States)

    Tsokris, Maureen

    2010-01-01

    This study investigated student and faculty perceptions of their experiences with online learning in dental hygiene Bachelor of Science degree completion programs on the dimensions of: quality of learning, connectedness to the learning environment, technology factors and student satisfaction. The experiences of dental hygiene students who took…

  1. Experiences of Students with Specific Learning Disorder (Including ADHD) in Online College Degree Programs: A Phenomenological Study

    Science.gov (United States)

    Bunch, Seleta LeAnn

    2016-01-01

    Enrollment in online degree programs is rapidly expanding due to the convenience and affordability offered to students and improvements in technology. The purpose of this hermeneutical phenomenological study was to understand the shared experiences of students with documented specific learning disorders (including Attention-Deficit/Hyperactivity…

  2. Undergraduate Game Degree Programs in the United Kingdom and United States: A Comparison of the Curriculum Planning Process

    Science.gov (United States)

    McGill, Monica M.

    2010-01-01

    Digital games are marketed, mass-produced, and consumed by an increasing number of people and the game industry is only expected to grow. In response, post-secondary institutions in the United Kingdom (UK) and the United States (US) have started to create game degree programs. Though curriculum theorists provide insight into the process of…

  3. Teaching and Understanding the Concept of Critical Thinking Skills within Michigan Accredited Associate Degree Dental Hygiene Programs

    Science.gov (United States)

    Beistle, Kimberly S.

    2012-01-01

    This study explores dental hygiene faculty's perceptions regarding the issues surrounding the concept of critical thinking skills integration within Michigan accredited associate degree dental hygiene programs. The primary research goals are to determine faculty understanding of the concept of critical thinking, identify personal and departmental…

  4. Proposal for a Wellness Clinician/Research Specialization for the Existing Degree Program, Master of Education in Physical Education.

    Science.gov (United States)

    Cardinal, Bradley J.; And Others

    Consistent with the Year 2000 National Health Promotion and Disease Prevention Objectives, this paper presents a proposal for a Wellness Clinician/Research specialization within the existing Master of Education in Physical Education degree program offered by the Division of Health, Physical Education, and Recreation at Wayne State University…

  5. Curriculum Development for Quantitative Skills in Degree Programs: A Cross-Institutional Study Situated in the Life Sciences

    Science.gov (United States)

    Matthews, Kelly E.; Belward, Shaun; Coady, Carmel; Rylands, Leanne; Simbag, Vilma

    2016-01-01

    Higher education policies are increasingly focused on graduate learning outcomes, which infer an emphasis on, and deep understanding of, curriculum development across degree programs. As disciplinary influences are known to shape teaching and learning activities, research situated in disciplinary contexts is useful to further an understanding of…

  6. The Impact of Adult Degree-Completion Programs on the Organizational Climate of Christian Colleges and Universities

    Science.gov (United States)

    Giles, Pamela

    2010-01-01

    Leaders in Christian higher education are often unaware of how adult degree completion programs (ADCPs) impact a school's organizational behavior, and no research has examined employees' perceptions of its impact. This nonexperimental, descriptive study examined differences in employees' perceptions of the impact on organizational climate of the…

  7. Government Career Interests, Perceptions of Fit, and Degree Orientations: Exploring Their Relationship in Public Administration Graduate Programs

    Science.gov (United States)

    Bright, Leonard

    2018-01-01

    Scholars have long suggested that the degree orientations of public administration programs were related to the attitudes and behaviors of students, even though empirical research had failed to confirm this relationship. The purpose of this study was to re-examine this question from the standpoint of perceptions of fit. Using a sample of…

  8. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  9. Marketing for a Web-Based Master's Degree Program in Light of Marketing Mix Model

    Science.gov (United States)

    Pan, Cheng-Chang

    2012-01-01

    The marketing mix model was applied with a focus on Web media to re-strategize a Web-based Master's program in a southern state university in U.S. The program's existing marketing strategy was examined using the four components of the model: product, price, place, and promotion, in hopes to repackage the program (product) to prospective students…

  10. Responding to the call for globalization in nursing education: the implementation of the transatlantic double-degree program.

    Science.gov (United States)

    Hornberger, Cynthia A; Erämaa, Sirkka; Helembai, Kornélia; McCartan, Patrick J; Turtiainen, Tarja

    2014-01-01

    Increased demand for nurses worldwide has highlighted the need for a flexible nursing workforce eligible for licensure in multiple countries. Nursing's curricular innovation mirrors the call for reform within higher education including globalization of curricula (E. J. S. Hovenga, 2004; D. Nayyar, 2008; B. J. G. Wood, S. M. Tapsall, & G. N. Soutar, 2005), increased opportunities for student mobility exchanges, dialogue between different academic traditions, and mutual understanding and transparency between universities (J. González & R. Wagenaar, 2005). The European Union (EU) and United States have combined efforts to achieve these objectives by creating the Atlantis program in 2007 (U.S. Department of Education, 2011). This article describes experiences of four nursing programs participating in an Atlantis project to develop a double-degree baccalaureate program for undergraduate nursing students. Early learnings include increasing awareness and appreciation of essential curricular and performance competencies of the baccalaureate-prepared professional nurse. Challenges include language competency; variations in curriculum, cultural norms, student expectations, and learning assessment; and philosophical differences regarding first-level professional nurse preparation as specialist versus generalist. The Transatlantic Double Degree program has successfully implemented the double-degree program. Members have gained valuable insights into key issues surrounding the creation of a more uniform, yet flexible, educational standard between our countries. © 2014.

  11. Safeguard and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support U.S. nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  12. Safeguards and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support US nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  13. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  14. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    Science.gov (United States)

    2016-04-21

    Sensitive Compartmented Information ( SCI ) References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD...collateral, special access program, SCI , and controlled unclassified information (CUI) within an overarching DoD Information Security Program...use, and dissemination of SCI within the DoD pursuant to References (a), (c), and (e) and Executive Order 12333 (Reference (h)). 2

  15. Automated Source Code Analysis to Identify and Remove Software Security Vulnerabilities: Case Studies on Java Programs

    OpenAIRE

    Natarajan Meghanathan

    2013-01-01

    The high-level contribution of this paper is to illustrate the development of generic solution strategies to remove software security vulnerabilities that could be identified using automated tools for source code analysis on software programs (developed in Java). We use the Source Code Analyzer and Audit Workbench automated tools, developed by HP Fortify Inc., for our testing purposes. We present case studies involving a file writer program embedded with features for password validation, and ...

  16. A two-factor, stochastic programming model of Danish mortgage-backed securities

    DEFF Research Database (Denmark)

    Nielsen, Søren S.; Poulsen, Rolf

    2004-01-01

    -trivial, both in terms of deciding on an initial mortgage, and in terms of managing (rebalancing) it optimally.We propose a two-factor, arbitrage-free interest-rate model, calibrated to observable security prices, and implement on top of it a multi-stage, stochastic optimization program with the purpose...

  17. From Charity to Security: The Emergence of the National School Lunch Program

    Science.gov (United States)

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  18. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  19. AspectKE*:Security Aspects with Program Analysis for Distributed Systems

    DEFF Research Database (Denmark)

    2010-01-01

    AspectKE* is the first distributed AOP language based on a tuple space system. It is designed to enforce security policies to applications containing untrusted processes. One of the key features is the high-level predicates that extract results of static program analysis. These predicates provide...

  20. Three Hundred Sixty Degree Feedback: program implementation in a local health department.

    Science.gov (United States)

    Swain, Geoffrey R; Schubot, David B; Thomas, Virginia; Baker, Bevan K; Foldy, Seth L; Greaves, William W; Monteagudo, Maria

    2004-01-01

    Three Hundred Sixty Degree Feedback systems, while popular in business, have been less commonly implemented in local public health agencies. At the same time, they are effective methods of improving employee morale, work performance, organizational culture, and attainment of desired organizational outcomes. These systems can be purchased "off-the-shelf," or custom applications can be developed for a better fit with unique organizational needs. We describe the City of Milwaukee Health Department's successful experience customizing and implementing a 360-degree feedback system in the context of its ongoing total quality improvement efforts.

  1. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  2. Proposal for a Ph.D. Degree Program in Business Communication

    Science.gov (United States)

    Hildebrandt, Herbert

    1978-01-01

    Outlines procedures and assumptions for instituting a doctoral program in business communication. Lists general/specific requirements for enrollment, and suggests business-core and interdepartmental curricula. (RL)

  3. Personality Procrastination and Cheating in Students from different University Degree Programs

    Science.gov (United States)

    Clariana, Merce

    2013-01-01

    Introduction: Personality, procrastination and dishonest behaviour in the classroom (or cheating) are variables that have been seen to have an important influence on learning. However, they have seldom been studied together and even less taking into account the gender of the student and their choice of degree course. This work analyses the…

  4. Solving the Fully Fuzzy Bilevel Linear Programming Problem through Deviation Degree Measures and a Ranking Function Method

    Directory of Open Access Journals (Sweden)

    Aihong Ren

    2016-01-01

    Full Text Available This paper is concerned with a class of fully fuzzy bilevel linear programming problems where all the coefficients and decision variables of both objective functions and the constraints are fuzzy numbers. A new approach based on deviation degree measures and a ranking function method is proposed to solve these problems. We first introduce concepts of the feasible region and the fuzzy optimal solution of a fully fuzzy bilevel linear programming problem. In order to obtain a fuzzy optimal solution of the problem, we apply deviation degree measures to deal with the fuzzy constraints and use a ranking function method of fuzzy numbers to rank the upper and lower level fuzzy objective functions. Then the fully fuzzy bilevel linear programming problem can be transformed into a deterministic bilevel programming problem. Considering the overall balance between improving objective function values and decreasing allowed deviation degrees, the computational procedure for finding a fuzzy optimal solution is proposed. Finally, a numerical example is provided to illustrate the proposed approach. The results indicate that the proposed approach gives a better optimal solution in comparison with the existing method.

  5. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    Science.gov (United States)

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  6. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  7. The Great Plains IDEA Gerontology Program: An Online, Interinstitutional Graduate Degree

    Science.gov (United States)

    Sanders, Gregory F.

    2011-01-01

    The Great-Plains IDEA Gerontology Program is a graduate program developed and implemented by the Great Plains Interactive Distance Education Alliance (Great Plains IDEA). The Great Plains IDEA (Alliance) originated as a consortium of Colleges of Human Sciences ranging across the central United States. This Alliance's accomplishments have included…

  8. An Achievement Degree Analysis Approach to Identifying Learning Problems in Object-Oriented Programming

    Science.gov (United States)

    Allinjawi, Arwa A.; Al-Nuaim, Hana A.; Krause, Paul

    2014-01-01

    Students often face difficulties while learning object-oriented programming (OOP) concepts. Many papers have presented various assessment methods for diagnosing learning problems to improve the teaching of programming in computer science (CS) higher education. The research presented in this article illustrates that although max-min composition is…

  9. Security management internship program: a great recruiting tool for your company.

    Science.gov (United States)

    Yaross, Dan; Morris, Ronald J

    2013-01-01

    A well thought out and managed internship program is easily a "win-win" situation, according to the authors, who established such a program for the security department of their hospital. The program benefits not only the students with gaining practical experience of the business environment, but also the colleges/universities in coordinating internship opportunities for its students and business organizations in a number of ways including the possible identification of potential young career candidates to augment their current workforces. The article is based on the authors' presentation at the ASIS International Annual Seminar in September 2012.

  10. Indirect synthesis of multi-degree of freedom transient systems. [linear programming for a kinematically linear system

    Science.gov (United States)

    Pilkey, W. D.; Chen, Y. H.

    1974-01-01

    An indirect synthesis method is used in the efficient optimal design of multi-degree of freedom, multi-design element, nonlinear, transient systems. A limiting performance analysis which requires linear programming for a kinematically linear system is presented. The system is selected using system identification methods such that the designed system responds as closely as possible to the limiting performance. The efficiency is a result of the method avoiding the repetitive systems analyses accompanying other numerical optimization methods.

  11. The Hybrid Public Research University: A Comparative Case Study of Two Self-Sustaining Degree Programs in Public Health

    OpenAIRE

    Hagigi, Farhad A

    2014-01-01

    Abstract of the DissertationThe Hybrid Public Research University: A Comparative Case Study of Two Self‐Sustaining Degree Programs in Public HealthByFarhad Abas HagigiDoctor of Philosophy in EducationUniversity of California, Los Angeles, 2014Professor Walter R. Allen, Co-ChairProfessor Jos� Luis Santos, Co-ChairDecreased public funding, diminishing political and societal support, and increased competition from private institutions have led public research universities (PRUs) to under...

  12. Experiences in solving the challenges of on-site degree programs

    International Nuclear Information System (INIS)

    Christenson, J.M.; Eckart, L.E.

    1987-01-01

    The University of Cincinnati (UC) Nuclear Engineering Program Faculty has now had six years of experience in delivering on-site educational programs to nuclear power plant technical personnel. Programs of this type present a variety of challenges to the faculty, the management of the client utility and to the students who become involved in a particular program. This paper describes how each of these groups can identify and successfully solve these challenges. The solutions the authors describe are drawn from their own experiences which have been described in some detail elsewhere. Other solutions to those challenges are certainly possible. They make no claim for the particular ones they offer, beyond the fact that they have worked over a sustained period of time and that results they have produced have left all three parties mutually satisfied

  13. Where are the women? Campus climate and the degree aspirations of women in science, technology, engineering and mathematics programs

    Science.gov (United States)

    Schulz, Phyllis

    Women remain underrepresented in science, technology, engineering, and mathematics (STEM) at all levels of higher education, which has become a concern in the competitive global marketplace. Using both quantitative and qualitative analysis, this dissertation sought to learn more about how the campus climate and self-concept influence the degree aspirations of female undergraduate students majoring in STEM programs. Using the Beginning Post-Secondary dataset, regression analyses showed that a student's initial degree aspirations, SAT scores, and interactions with faculty were all positively related to their degree aspirations three years later. Interviews with seven current STEM undergraduates confirmed the importance of interaction with faculty and suggested undergraduate research and classroom experiences also play a role in the degree aspirations of STEM students. Three of the seven students interviewed began their undergraduate educations as non-STEM majors, suggesting that the traditional STEM pipeline may no longer be the norm. These findings suggest that both future research and current practitioners should focus on undergraduate STEM classroom and research experiences. Additionally, the characteristics of students who switch into STEM majors should be explored so that we may continue to expand the number of students pursuing STEM degrees.

  14. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success...

  15. The diffusion of the distance Entomology Master's Degree Program at the University of Nebraska Lincoln: A descriptive case study

    Science.gov (United States)

    Hubbell, Jody M.

    This study explored three selected phases of Rogers' (1995) Diffusion of Innovations Theory to examine the diffusion process of the distance Entomology Master's Degree program at the University of Nebraska, Lincoln. A qualitative descriptive case study approach incorporated semi-structured interviews with individuals involved in one or more of the three stages: Development, Implementation, and Institutionalization. Documents and archival evidence were used to triangulate findings. This research analyzed descriptions of the program as it moved from the Development, to the Implementation, and finally, the Institutionalization stages of diffusion. Each respective stage was examined through open and axial coding. Process coding identified themes common to two or more diffusion stages, and explored the evolution of themes from one diffusion stage to the next. At a time of significant budget constraints, many departments were faced with the possibility of merger or dissolution. The Entomology Master's Degree Program evolved from being an entrepreneurial means to prevent departmental dissolution to eventually being viewed as a model for the development of similar programs across this university and other institutions of higher education. During this evolution, the program was reinvented to meet the broader needs of industry and a global student market. One finding not consistent with Rogers' model was that smaller, rather than larger, departmental size contributed to the success of the program. Within this small department, faculty members were able to share their experiences and knowledge with each other on a regular basis, which promoted greater acceptance of the distance program. How quality and rigor may be defined and measured was a key issue in each respective stage. In this specific case, quality and rigor was initially a comparison of on-campus and distance course content and then moved to program-based assessment and measures of student outcomes such as job

  16. The first 50 years: A review of the Department of Energy domestic safeguards and security program

    Energy Technology Data Exchange (ETDEWEB)

    Desmond, W.J.; Zack, N.R.; Tape, J.W.

    1997-12-01

    World War II not only brought the United States rapidly into the nuclear age, but it also brought a new term, {open_quotes}safeguards.{close_quotes} By that time, physical security was an already established activity that dealt with the protection of possessions such as property, vehicles, and other valuables. A secret nuclear project under a stadium at the University of Chicago would add a new dimension to physical security. Similarly, a community known only by its post office box at a location 27 miles from Santa Fe, New Mexico (PO Box 1663) would initiate new programs to protect information and technology while their programs changed the science and warfare around the world. The Manhattan Project and what was to become the Los Alamos Scientific Laboratory (now Los Alamos National Laboratory) would extend the applications of physical security and, soon to be implemented, safeguards to produce important technical advances for the protection, accounting, control, and nonproliferation of fissile nuclear materials. Security for nuclear materials and weapons information began as a foremost consideration with the start of the nuclear programs in the early 1940s. In the 1960s, the Atoms for Peace Program promoted the peaceful use of nuclear energy and made the US a supplier of nuclear materials and peaceful-use nuclear technology to other states. This program also changed the focus on nuclear materials from that of worldwide control to inspection by an independent agency, the proposed International Atomic Energy Agency. At this same time the nuclear weapons states increased from three to five. Other nations worked to obtain a nuclear weapons capability, resulting in increasing concerns about nuclear proliferation.

  17. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Directory of Open Access Journals (Sweden)

    Arnon Hershkovitz

    2015-09-01

    Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.

  18. Lessons learned from the scaling-up of a weekly multimicronutrient supplementation program in the integrated food security program (PISA).

    Science.gov (United States)

    Lechtig, Aarón; Gross, Rainer; Vivanco, Oscar Aquino; Gross, Ursula; López de Romaña, Daniel

    2006-01-01

    Weekly multimicronutrient supplementation was initiated as an appropriate intervention to protect poor urban populations from anemia. To identify the lessons learned from the Integrated Food Security Program (Programa Integrado de Seguridad Alimentaria [PISA]) weekly multimicronutrient supplementation program implemented in poor urban populations of Chiclayo, Peru. Data were collected from a 12-week program in which multimicronutrient supplements were provided weekly to women and adolescent girls 12 through 44 years of age and children under 5 years of age. A baseline survey was first conducted. Within the weekly multimicronutrient supplementation program, information was collected on supplement distribution, compliance, biological effectiveness, and cost. Supplementation, fortification, and dietary strategies can be integrated synergistically within a micronutrient intervention program. To ensure high cost-effectiveness of a weekly multimicronutrient supplementation program, the following conditions need to be met: the program should be implemented twice a year for 4 months; the program should be simultaneously implemented at the household (micro), community (meso), and national (macro) levels; there should be governmental participation from health and other sectors; and there should be community and private sector participation. Weekly multimicronutrient supplementation programs are cost effective options in urban areas with populations at low risk of energy deficiency and high risk of micronutrient deficiencies.

  19. Physician Contribution to Developing an Online Master’s Degree in Education Program for Health Care Professionals

    Directory of Open Access Journals (Sweden)

    Kadriye O. Lewis, Ed.D.

    2006-07-01

    Full Text Available Online education is increasingly recognized by medical educators as a teaching and learning tool to support formal and continuing medical education. The faculty development team at Cincinnati Childrens Hospital Medical Center (CCHMC in collaboration with the University of Cincinnati College of Education (UCCOE developed an Online Masters Degree in Education program designed to provide healthcare professionals with the educational pedagogy needed to teach more effectively and to conduct educational research. A qualitative case study describes the experiences of four physicians who completed the existing Master’s Degree in Education (Curriculum and Instruction major in a combined in-class/online format. These physicians then helped customize the curriculum for medical education and adapt the program to an all-online format. Each participant benefited from the program in different ways (e.g. improved educational research methods, teaching and technology skills, assessment techniques, performance-based learning. The program introduced new concepts in education that the physician participants were able to adapt to medical education. All participants became more aware of their role as educators, and demonstrated increased understanding of teaching and learning concepts, including the many benefits of online learning for physicians with full-time professional responsibilities.

  20. Men's and Women's Intentions to Persist in Undergraduate Engineering Degree Programs

    Science.gov (United States)

    Concannon, James P.; Barrow, Lloyd H.

    2010-01-01

    This is a quantitative study of 493 undergraduate engineering majors' intentions to persist in their engineering program. Using a multiple analysis of variance analysis, men and women had one common predictor for their intentions to persist, engineering career outcome expectations. However, the best sociocognitive predictor for men's persistence…

  1. Mentoring in Clinical-Translational Research: A Study of Participants in Master’s Degree Programs

    OpenAIRE

    McGinn, Aileen P; Lee, Linda S; Baez, Adriana; Zwanziger, Jack; Anderson, Karl E; Seely, Ellen W; Schoenbaum, Ellie

    2015-01-01

    Research projects in translational science are increasingly complex and require interdisciplinary collaborations. In the context of training translational researchers, this suggests that multiple mentors may be needed in different content areas. This study explored mentoring structure as it relates to perceived mentoring effectiveness and other characteristics of masters-level trainees in clinical-translational research training programs.

  2. An Examination of Job Skills Posted on Internet Databases: Implications for Information Systems Degree Programs.

    Science.gov (United States)

    Liu, Xia; Liu, Lai C.; Koong, Kai S.; Lu, June

    2003-01-01

    Analysis of 300 information technology job postings in two Internet databases identified the following skill categories: programming languages (Java, C/C++, and Visual Basic were most frequent); website development (57% sought SQL and HTML skills); databases (nearly 50% required Oracle); networks (only Windows NT or wide-area/local-area networks);…

  3. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  4. Association Between Socioeconomic Status and Participation in Colonoscopy Screening Program in First Degree Relatives of Colorectal Cancer Patients.

    Science.gov (United States)

    Chouhdari, Arezoo; Yavari, Parvin; Pourhoseingholi, Mohammad Amin; Sohrabi, Mohammad-Reza

    2016-04-01

    Approximately 15% to 25% of colorectal cancer (CRC) cases have positive family history for disease. Colonoscopy screening test is the best way for prevention and early diagnosis. Studies have found that first degree relatives (FDRs) with low socioeconomic status are less likely to participate in colonoscopy screening program. The aim of this study is to determine the association between socioeconomic status and participation in colonoscopy screening program in FDRs. This descriptive cross-sectional, study has been conducted on 200 FDRs who were consulted for undergoing colonoscopy screening program between 2007 and 2013 in research institute for gastroenterology and liver disease of Shahid Beheshti University of Medical Sciences, Tehran, Iran. They were interviewed via phone by a valid questionnaire about socioeconomic status. For data analysis, chi-square, exact fisher and multiple logistic regression were executed by SPSS 19. The results indicated 58.5% participants underwent colonoscopy screening test at least once to the time of the interview. There was not an association between participation in colonoscopy screening program and socioeconomic status to the time of the interview in binomial analysis. But statistical significance between intention to participate and educational and income level were found. We found, in logistic regression analysis, that high educational level (Diploma and University degree in this survey) was a predictor to participate in colonoscopy screening program in FDRs. According to this survey low socioeconomic status is an important factor to hinder participation of FDRs in colonoscopy screening program. Therefore, planned interventions for elevation knowledge and attitude in FDRs with low educational level are necessary. Also, reducing colonoscopy test costs should be a major priority for policy makers.

  5. Inter-Institutional Partnerships Propel A Successful Collaborative Undergraduate Degree Program In Chemistry.

    Science.gov (United States)

    D'Souza, Malcolm J; Wang, Qiquan

    2012-10-01

    Small private liberal arts colleges are increasingly tuition-dependent and mainly attract students by creating student-centered learning communities. On the other hand, larger universities tend to be trendsetters where its faculty tend to seek intellectual independence and are involved in career focused cutting-edge research. The Institutional Development Awards (IDeA) and Experimental Program to Stimulate Competitive Research (EPSCoR) are federal-state-university partnerships that builds basic research infrastructure and coax the state-wide higher education institutions to collaborate with each other in order to enhance their competitiveness. As a result in Delaware, Wesley College instituted curricular and operational changes to launch an undergraduate program in biological chemistry where its students take three upper division chemistry courses and can choose to participate in annual summer undergraduate internships at nearby Delaware State University.

  6. Mentoring in Clinical-Translational Research: A Study of Participants in Master's Degree Programs.

    Science.gov (United States)

    McGinn, Aileen P; Lee, Linda S; Baez, Adriana; Zwanziger, Jack; Anderson, Karl E; Seely, Ellen W; Schoenbaum, Ellie

    2015-12-01

    Research projects in translational science are increasingly complex and require interdisciplinary collaborations. In the context of training translational researchers, this suggests that multiple mentors may be needed in different content areas. This study explored mentoring structure as it relates to perceived mentoring effectiveness and other characteristics of master's-level trainees in clinical-translational research training programs. A cross-sectional online survey of recent graduates of clinical research master's program was conducted. Of 73 surveys distributed, 56.2% (n = 41) complete responses were analyzed. Trainees were overwhelmingly positive about participation in their master's programs and the impact it had on their professional development. Overall the majority (≥75%) of trainees perceived they had effective mentoring in terms of developing skills needed for conducting clinical-translational research. Fewer trainees perceived effective mentoring in career development and work-life balance. In all 15 areas of mentoring effectiveness assessed, higher rates of perceived mentor effectiveness was seen among trainees with ≥2 mentors compared to those with solo mentoring (SM). In addition, trainees with ≥2 mentors perceived having effective mentoring in more mentoring aspects (median: 14.0; IQR: 12.0-15.0) than trainees with SM (median: 10.5; IQR: 8.0-14.5). Results from this survey suggest having ≥2 mentors may be beneficial in fulfilling trainee expectations for mentoring in clinical-translational training. © 2015 Wiley Periodicals, Inc.

  7. Mentoring in Clinical‐Translational Research: A Study of Participants in Master's Degree Programs

    Science.gov (United States)

    Lee, Linda S.; Baez, Adriana; Zwanziger, Jack; Anderson, Karl E.; Seely, Ellen W.; Schoenbaum, Ellie

    2015-01-01

    Abstract Research projects in translational science are increasingly complex and require interdisciplinary collaborations. In the context of training translational researchers, this suggests that multiple mentors may be needed in different content areas. This study explored mentoring structure as it relates to perceived mentoring effectiveness and other characteristics of master's‐level trainees in clinical‐translational research training programs. A cross‐sectional online survey of recent graduates of clinical research master's program was conducted. Of 73 surveys distributed, 56.2% (n = 41) complete responses were analyzed. Trainees were overwhelmingly positive about participation in their master's programs and the impact it had on their professional development. Overall the majority (≥75%) of trainees perceived they had effective mentoring in terms of developing skills needed for conducting clinical‐translational research. Fewer trainees perceived effective mentoring in career development and work‐life balance. In all 15 areas of mentoring effectiveness assessed, higher rates of perceived mentor effectiveness was seen among trainees with ≥2 mentors compared to those with solo mentoring (SM). In addition, trainees with ≥2 mentors perceived having effective mentoring in more mentoring aspects (median: 14.0; IQR: 12.0–15.0) than trainees with SM (median: 10.5; IQR: 8.0–14.5). Results from this survey suggest having ≥2 mentors may be beneficial in fulfilling trainee expectations for mentoring in clinical‐translational training. PMID:26534872

  8. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  9. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  10. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    Energy Technology Data Exchange (ETDEWEB)

    Koech, H K [Program Manager CBP/DHS Office Number 363-6109 Cell Number 0722-774-912, Office Location: Ground Floor U.S. Embassy Nairobi (Kenya)

    2010-07-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  11. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Koech, H.K.

    2010-01-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  12. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  13. Integrating Service ­Learning and International Study into the Traditional Degree Programs

    OpenAIRE

    Newcomer, Quint

    2010-01-01

    In 2001, the University of Georgia Foundation made a significant commitment to expanding the opportunity for study abroad at UGA when it purchased a 155‐acre farm and built a new education and research center in San Luis de Monteverde, Costa Rica. UGA Costa Rica collaborates with departments and schools across the University to offer study abroad programs that offer courses directly related to major areas of study and that also integrate service‐learning as a central component of the overall ...

  14. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  15. Designing and conducting MD/MPH dual degree program in the Medical School of Shiraz University of Medical Sciences.

    Science.gov (United States)

    Salehi, Alireza; Hashemi, Neda; Saber, Mahboobeh; Imanieh, Mohammad Hadi

    2015-07-01

    Many studies have focused on the need of health systems to educated physicians in the clinical prevention, research methodology, epidemiology and health care management and emphasize the important role of this training in the public health promotion. On this basis, Shiraz University of Medical Sciences (SUMS) has established MD/MPH dual degree program since the year 2012. In the current study, Delphi technique was used. Both qualitative and quantitative methods were applied in the Delphi process. The Delphi team members including experts with extensive experience in teaching, research and administration in the field of educational management and health/medical education reached consensus in almost 86% of the questionnaire items through three Delphi rounds. MD/MPH program for SUMS was designed based on the items agreed and thematic analysis used in these rounds. The goals, values, mission and program requirements including the period, the entrance condition, and the number of units, and certification were determined. Accordingly, the courses of the program are presented in parallel with the MD education period. MPH courses consist of 35 units including 16 obligatory and 15 voluntary ones. Designing MD/MPH program in SUMS based on the existent models in the universities in different countries, compatible with educational program of this university and needs of national health system in Iran, can be a beneficial measure towards promoting the students' knowledge and theoretical/practical skills in both individual and social level. Performing some additional research to assess the MD/MPH program and some cohort studies to evaluate the effect of this program on the students' future professional life is recommended.

  16. A stochastic security approach to energy and spinning reserve scheduling considering demand response program

    International Nuclear Information System (INIS)

    Partovi, Farzad; Nikzad, Mehdi; Mozafari, Babak; Ranjbar, Ali Mohamad

    2011-01-01

    In this paper a new algorithm for allocating energy and determining the optimum amount of network active power reserve capacity and the share of generating units and demand side contribution in providing reserve capacity requirements for day-ahead market is presented. In the proposed method, the optimum amount of reserve requirement is determined based on network security set by operator. In this regard, Expected Load Not Supplied (ELNS) is used to evaluate system security in each hour. The proposed method has been implemented over the IEEE 24-bus test system and the results are compared with a deterministic security approach, which considers certain and fixed amount of reserve capacity in each hour. This comparison is done from economic and technical points of view. The promising results show the effectiveness of the proposed model which is formulated as mixed integer linear programming (MILP) and solved by GAMS software. -- Highlights: → Determination of optimal spinning reserve capacity requirement in order to satisfy desired security level set by system operator based on stochastic approach. → Scheduling energy and spinning reserve markets simultaneously. → Comparing the stochastic approach with deterministic approach to determine the advantages and disadvantages of each. → Examine the effect of demand response participation in reserve market to provide spinning reserve.

  17. WTO Compliance Status of the Conservation Security Program (CSP) and the Conservation Reserve Program (CRP)

    National Research Council Canada - National Science Library

    Schnepf, Randy

    2007-01-01

    .... This report is not a legal opinion, but describes both the CSP and CRP programs, the WTO Annex II provisions that govern compliance, and the potential issues involved in evaluating the compliance status of the two programs. This report will be updated as events warrant.

  18. Associate Degree Nursing: Model Prerequisites Validation Study. California Community College Associate Degree Programs by The Center for Student Success, A Health Care Initiative Sponsored Project.

    Science.gov (United States)

    Phillips, Brad C.; Spurling, Steven; Armstrong, William A.

    California faces a severe nursing shortage, with the number of registered nurses far below what is required to avert a potential state health care crisis. The Associate Degree Nursing (ADN) Project is a joint project involving scholars, educational researchers, and analysts from the Center for Student Success (CSS) housed at City College of San…

  19. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  20. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2

    National Research Council Canada - National Science Library

    1997-01-01

    ...) Systems, and 33-2, Information Protection. This instruction prescribes the requirements, responsibilities and procedures for the security program for the Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS...

  1. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  2. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  3. Sowing the Seeds of Strategic Success Across West Africa: Propagating the State Partnership Program to Shape the Security Environment

    Science.gov (United States)

    2017-06-09

    region’s continued growth in economics , population, influence, and the correlating 17 increase in risks to stability from radicalization and...environment and stem the tide of regional instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic... instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic Combatant Commanders can leverage to enhance the

  4. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  5. Martin Continues His Homeland Security Profession with New UASI Position

    OpenAIRE

    Issvoran, Heather

    2014-01-01

    Bruce Martin has found a second act in homeland security. The fire services veteran and college educator is now Project Manager of the Bay Area Urban Areas Security Initiative (UASI), overseeing its Chemical, Biological, Radiological, Nuclear Explosives (CBRNE) program. Martin is a 2010 master’s degree graduate of the Naval Postgraduate School Center for Homeland Defense and Security.

  6. Cost of the Cervical Cancer Screening Program at the Mexican Social Security Institute

    Directory of Open Access Journals (Sweden)

    Víctor Granados-García

    2014-09-01

    Full Text Available Objective. To estimate the annual cost of the National Cervical Cancer Screening Program (CCSP of the Mexican Institute of Social Security (IMSS. Materials and methods. This cost analysis examined regional coverage rates reported by IMSS. We estimated the number of cytology, colposcopy, biopsy and pathology evaluations, as well as the diagnostic test and treatment costs for cervical intraepithelial neoplasia grade II and III (CIN 2/3 and cervical cancer. Diagnostic test costs were estimated using a micro-costing technique. Sensitivity analyses were performed. Results. The cost to perform 2.7 million cytology tests was nearly 38 million dollars, which represents 26.1% of the total program cost (145.4 million. False negatives account for nearly 43% of the program costs. Conclusion. The low sensitivity of the cytology test generates high rates of false negatives, which results in high institutional costs from the treatment of undetected cervical cancer cases.

  7. Preferred Methods of Learning for Nursing Students in an On-Line Degree Program.

    Science.gov (United States)

    Hampton, Debra; Pearce, Patricia F; Moser, Debra K

    Investigators have demonstrated that on-line courses result in effective learning outcomes, but limited information has been published related to preferred teaching strategies. Delivery of on-line courses requires various teaching methods to facilitate interaction between students, content, and technology. The purposes of this study were to understand student teaching/learning preferences in on-line courses to include (a) differences in preferred teaching/learning methods for on-line nursing students across generations and (b) which teaching strategies students found to be most engaging and effective. Participants were recruited from 2 accredited, private school nursing programs (N=944) that admit students from across the United States and deliver courses on-line. Participants provided implied consent, and 217 (23%) students completed the on-line survey. Thirty-two percent of the students were from the Baby Boomer generation (1946-1964), 48% from Generation X (1965-1980), and 20% from the Millennial Generation (born after 1980). The preferred teaching/learning methods for students were videos or narrated PowerPoint presentations, followed by synchronous Adobe Connect educations sessions, assigned journal article reading, and e-mail dialog with the instructor. The top 2 methods identified by participants as the most energizing/engaging and most effective for learning were videos or narrated PowerPoint presentations and case studies. The teaching/learning method least preferred by participants and that was the least energizing/engaging was group collaborative projects with other students; the method that was the least effective for learning was wikis. Baby Boomers and Generation X participants had a significantly greater preference for discussion board (PBaby Boomer and Generation X students and rated on-line games as significantly more energizing/engaging and more effective for learning (PBaby Boomer and Generation X students. In conclusion, the results of this

  8. Security programs for Category I or II nuclear material or certain nuclear facilities. Regulatory guide G-274

    International Nuclear Information System (INIS)

    2003-03-01

    The purpose of this regulatory guide is to help applicants for a Canadian Nuclear Safety Commission (CNSC) licence in respect of Category I or II nuclear material - other than a licence to transport - , or a nuclear facility consisting of a nuclear reactor that may exceed 10 MW thermal power during normal operation, prepare and submit the security information to be included with the application, pursuant to the Nuclear Safety and Control Act (NSCA). Category I and II nuclear material are defined in Appendix B to this guide. This guide describes: the security information that should typically be included with the application for any licence referred to above; how the security information may be organized and presented in a separate document (hereinafter 'the security program description'), in order to assist CNSC review and processing of the application; and, the administrative procedures to be followed when preparing, submitting or revising the security program description. (author)

  9. Web-based audiovisual phonetic table program application as e-learning of pronunciation practice in undergraduate degree program

    Directory of Open Access Journals (Sweden)

    Retnomurti Ayu Bandu

    2018-01-01

    Full Text Available Verbal-based learning such as English pronunciation practice requires the existence of an effective e-learning because if it is directly given without any learning media, inaccuracies in pronunciation, spelling, repetition will usually occur in the spoken language. Therefore, this study aims to develop e-learning to be used in the Pronunciation Practice class, Indraprasta PGRI University. This research belongs to Research and Development are: requires an analysis, develops syllabus and teaching materials, creates and develops e-learning, tries and revises the media. Consequently, there is a need to develop module in the classroom into a versatile technology web-based module in the form of Phonetic Table Program. The result is carried out in pronunciation practice classes to find more details on some parts that may still not be detected by the researchers. Thus, the use of technology has become a necessity to assist students in achieving the learning objectives. Therefore, the process of communication in learning will attract more students’ interest and provide facilities to understand the sound system of English as it is equipped with buttons to practice presented by nonnative speakers. Non-native speakers’ selection are based on the consideration that they quickly adapt helping other students who are less fluent in English.

  10. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks...

  11. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  12. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    Science.gov (United States)

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  13. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  14. [Public health competencies and contents in Spanish university degree programs of physical therapy, occupational therapy, environmental science, dentistry and veterinary science].

    Science.gov (United States)

    Davó-Blanes, M Carmen; Vives-Cases, Carmen; Alvarez-Dardet, Carlos; Segura-Benedicto A, Andreu; Bosch Llonch, Fèlix; G Benavides, Fernando

    2014-01-01

    To identify the basic competencies and contents related to public health to be included in degree programs according to the perspective of lecturers from various Spanish universities. In the context of the Second Workshop on Public Health Contents in Degree Programs (Mahon, 19 to 20 September 2012), 20 lecturers from different Spanish universities were distributed in five working groups. The lecturers had been selected from the instructional guides on public health and epidemiology published on the web sites of the Rectors' Conference of Spanish Universities. Each group worked on a degree program and the results were discussed in plenary sessions. The activities and competencies related to the three basic functions of public health were identified in all degree programs. Most of the professional competencies identified were related to the function of «assessment of population health needs». The contents proposed by the working groups related to epidemiology, basic concepts in public health, public health intervention, health management, and health policy. The main common topics among the degrees concerned the first three contents. Public health professional competencies and contents were identified in the degree programs examined. These results may serve as a starting point for a more detailed review of public health programs across degree levels and the search for a consensus on the common content that should be included in each of them. Copyright © 2013 SESPAS. Published by Elsevier Espana. All rights reserved.

  15. Department of energy defense programs perspectives on safeguards, security, and classification

    International Nuclear Information System (INIS)

    Eyck, E.Q.T.

    1989-01-01

    This paper discusses why national and international safeguards and the protection of sensitive information are important to the United States and to other nations. It demonstrates that while the opposite consequence appears logical these functions will probably become even more important if the major powers agree on further arms reductions. Some of the steps taken by the U.S. Department of Energy to improve the effectiveness of its safeguards, security, and classification programs are reviewed. The valuable contributions in these areas since 1968 and 1976, respectively by the Technical Support Organization and the International Safeguards Project Offoce at Brookhaven are noted

  16. Novel methods for Solving Economic Dispatch of Security-Constrained Unit Commitment Based on Linear Programming

    Science.gov (United States)

    Guo, Sangang

    2017-09-01

    There are two stages in solving security-constrained unit commitment problems (SCUC) within Lagrangian framework: one is to obtain feasible units’ states (UC), the other is power economic dispatch (ED) for each unit. The accurate solution of ED is more important for enhancing the efficiency of the solution to SCUC for the fixed feasible units’ statues. Two novel methods named after Convex Combinatorial Coefficient Method and Power Increment Method respectively based on linear programming problem for solving ED are proposed by the piecewise linear approximation to the nonlinear convex fuel cost functions. Numerical testing results show that the methods are effective and efficient.

  17. Synergies between Communicable and Noncommunicable Disease Programs to Enhance Global Health Security.

    Science.gov (United States)

    Kostova, Deliana; Husain, Muhammad J; Sugerman, David; Hong, Yuling; Saraiya, Mona; Keltz, Jennifer; Asma, Samira

    2017-12-01

    Noncommunicable diseases are the leading cause of death and disability worldwide. Initiatives that advance the prevention and control of noncommunicable diseases support the goals of global health security in several ways. First, in addressing health needs that typically require long-term care, these programs can strengthen health delivery and health monitoring systems, which can serve as necessary platforms for emergency preparedness in low-resource environments. Second, by improving population health, the programs might help to reduce susceptibility to infectious outbreaks. Finally, in aiming to reduce the economic burden associated with premature illness and death from noncommunicable diseases, these initiatives contribute to the objectives of international development, thereby helping to improve overall country capacity for emergency response.

  18. (In)security factor atomic bomb. An analysis of the crisis with the Iranian nuclear program

    International Nuclear Information System (INIS)

    Bock, Andreas

    2012-04-01

    Iran is a rational actor in the international politics that decides on the basis of the perception of threat. Iran's security situation is comparable with that of Israel with the rational consequence to rely on the atomic program with respect to deterrence and self-defense. The solution of the Iran crisis is basically dependent on a change of the perception of threat. A military act against the Iranian nuclear facilities would be counterproductive, would only slowing down the program but not prevent further activities. In fact a military act would enhance the perception of threat. For the analysis of the Iran crises the author used the Cuba crisis as blueprint, were mislead perceptions were responsible for the escalation.

  19. A qualitative study of physicians' experiences with online learning in a masters degree program: benefits, challenges, and proposed solutions.

    Science.gov (United States)

    Dyrbye, Liselotte; Cumyn, Annabelle; Day, Hollis; Heflin, Mitchell

    2009-02-01

    In response to challenges to faculty development (e.g. time away from clinical, teaching, and other responsibilities; lack of mentors; and limited resources) online learning has become an important venue to provide education for physicians in curriculum development, instruction, assessment, evaluation, educational leadership, and education scholarship. Online learning however has its own unique challenges. Little is known about clinician-educators' experiences while participating in online programs and few studies have focused on their approaches to facilitate online learning. To explore the experiences of physicians pursuing a degree in higher education with online learning, including motivations for choosing this format, barriers encountered, and ideas for facilitating learning in the online environment. All students (n = 71) enrolled in online courses in the University of Illinois at Chicago Masters of Health Profession Education Program were surveyed in the spring of 2006. Responses were analysed using a qualitative approach. Of the 48 students who completed the survey (response rate 68%) 45 (94%) were physicians. The online format is convenient, flexible, and may be beneficial for learning. Students' responses raise issues inherent to online learning that must be addressed to optimize student-centered learning. These issues relate to: clarity of communication; difficulties in negotiating team work and in building relationships; technical demands; learning style preferences, and time commitment. Students provided recommendations for strategies to address these issues such as how to communicate clearly, facilitate teamwork, and optimize time management. Member checking supported the analysis. Online education programs meet the needs of physicians but have associated challenges. Further research is needed to explore the potential value of student suggested ways to optimize the online learning experience.

  20. Impact of the National Food Supplementary Program for Children on Household Food Security and Maternal Weight Status in Iran.

    Science.gov (United States)

    Ghodsi, Delaram; Omidvar, Nasrin; Eini-Zinab, Hassan; Rashidian, Arash; Raghfar, Hossein

    2016-01-01

    Food aid programs are strategies that aim to improve nutritional status and to tackle food insecurity. This study aimed to evaluate the effect of a National Food Supplementary Program for Children on households' food security. The study sample included 359 mothers of children aged 6-72 months under the coverage of the program in two provinces of Iran. Demographic and socioeconomic characteristics of the households and percentage of supplementary food items consumed by target child were assessed by a questionnaire and checklist. Data on household food security were collected by locally adapted Household Food Insecurity Access Scale at the baseline of the study and 6 months thereafter. At the baseline, only 4.7% of families were food secure, while 43.5% were severely food insecure, and these proportions were changed to 7.9% and 38%, respectively ( P security in the baseline and at the end of the study ( P > 0.05). Findings show that the food supplementary program for children can also improve the household food security status. Further research is needed to assess other factors that affect the effectiveness of this kind of programs.

  1. Leadership in Dental Hygiene Degree Completion Programs: A Pilot Study Comparing Stand-Alone Leadership Courses and Leadership-Infused Curricula.

    Science.gov (United States)

    Smith, Michelle L; Gurenlian, JoAnn R; Freudenthal, Jacqueline J; Farnsworth, Tracy J

    2016-05-01

    The aim of this study was to define the extent to which leadership and leadership skills are taught in dental hygiene degree completion programs by comparing stand-alone leadership courses/hybrid programs with programs that infuse leadership skills throughout the curricula. The study involved a mixed-methods approach using qualitative and quantitative data. Semi-structured interviews were conducted with program directors and faculty members who teach a stand-alone leadership course, a hybrid program, or leadership-infused courses in these programs. A quantitative comparison of course syllabi determined differences in the extent of leadership content and experiences between stand-alone leadership courses and leadership-infused curricula. Of the 53 U.S. dental hygiene programs that offer degree completion programs, 49 met the inclusion criteria, and 19 programs provided course syllabi. Of the program directors and faculty members who teach a stand-alone leadership course or leadership-infused curriculum, 16 participated in the interview portion of the study. The results suggested that competencies related to leadership were not clearly defined or measurable in current teaching. Reported barriers to incorporating a stand-alone leadership course included overcrowded curricula, limited qualified faculty, and lack of resources. The findings of this study provide a synopsis of leadership content and gaps in leadership education for degree completion programs. Suggested changes included defining a need for leadership competencies and providing additional resources to educators such as courses provided by the American Dental Education Association and the American Dental Hygienists' Association.

  2. National programs for the development and development of the culture of Security in the nuclear activities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Arnau Fernandez, A.

    2003-01-01

    From their appearance, as a result of the investigations of the accident in the Nuclear Power station of Chernobyl, the term Culture of Security has been considered a key element to achieve a elevated level of security in the nuclear facilities, becoming a basic principle of security, grateful internationally. The Organ Cuban Regulator understood from very early the importance of to promote and to develop attitudes and characteristic in the organizations and the personnel linked to the nuclear sector that you/they reflected a high culture of security, for to propitiate a bigger involvement of all in the topics of security and in that way to contribute significantly to the prevention of accidents in the nuclear facilities. Although the Program Nuclear Cuban suffered serious reductions in the decade of the years 90, the Organ Regulator has continuous working in this address, assimilating all the international experience for its application in their strategies of development of the culture of security in the nuclear activities that today they are executed in the country. The present work picks up the Cuban experience in the conformation of a National Program for the development and development of the Culture of Security

  3. Source Security Program in the Philippines: a lost source search experience

    International Nuclear Information System (INIS)

    Romallosa, Kristine M.; Salabit, Maria T.; Caseria, Estrella; Valdezco, Eulinia

    2008-01-01

    The Philippine Nuclear Research Institute (PNRI), the national agency in the licensing and regulations of radioactive materials in the country, is strengthening its capabilities in the security of radioactive sources. Part of this program is the PNRI's participation in the Regional Security of Radioactive Sources (RSRS) Project of the Australian Nuclear Science and Technology Organization (ANSTO). The project has provided equipment and methods training, assistance in the development of PNRI's own training program and support for actual orphan source search activities. On May 2007, a source search for the two lost Cs-137 level gauges of a steel manufacturing company was conducted by the PNRI and ANSTO. The source search are the: a) Development of instrument and source search training for the team, the National Training Workshop on Orphan Source Searches which was organized and conducted as a result of train-the-trainors fellowship under the RSRS project; and b) Planning and implementation of the lost source search activity. The conduct of the actual search on warehouses, product yard, canals, dust storage, steel making building, scrap yards and nearby junk shops of the steel plant took one week. The week-long search did not find the lost sources. However, naturally occurring radioactive materials identified to be Thorium, were found on sands, bricks and sack piles that are stored and/or generally present in the warehouses, yard and steel making building. The search activity had therefore cleared the facility of the lost source and its corresponding hazards. The NORM found present in the plant's premises on the other hand brought the attention of the management of the needed measures to ensure safety of the staff from possible hazards of these materials. Currently, the course syllabus that was developed is continuously enhanced to accommodate the training needs of the PNRI staff particularly for the emergency response and preparedness. This component of the source

  4. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  5. Oregon's Gun Relief Program for Adjudicated Mentally Ill Persons: The Psychiatric Security Review Board.

    Science.gov (United States)

    Britton, Juliet; Bloom, Joseph D

    2015-06-01

    This article describes the State of Oregon's implementation of two programs designed to comply with federal gun laws regarding reporting individuals who have received mental health adjudications in criminal and civil courts. One mandate requires that states submit names of adjudicated individuals to the National Instant Criminal Background Check System (NICS) while the second requires that the state establish a qualifying gun restoration program for those disqualified from gun ownership. In 2009, Oregon's Legislature developed an administrative approach to gun restoration and assigned the responsibility for conducting these hearing to the Oregon Psychiatric Security Review Board (PSRB). The PSRB is a state administrative board that has existed since 1977 and has been primarily focused on the supervision and treatment of adult and juvenile insanity acquittees. The gun restoration program began in 2010, but to date has only received three completed petitions requesting restoration of firearm rights. The article concludes with a discussion that surmises why very few of the Oregonians who are listed in NICS have submitted petitions for relief. Copyright © 2015 John Wiley & Sons, Ltd.

  6. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    Energy Technology Data Exchange (ETDEWEB)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services.

  7. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    International Nuclear Information System (INIS)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services

  8. Approaches for building community participation: A qualitative case study of Canadian food security programs.

    Science.gov (United States)

    Hyett, Nerida; Kenny, Amanda; Dickson-Swift, Virginia

    2017-10-01

    There is increasing opportunity and support for occupational therapists to expand their scope of practice in community settings. However, evidence is needed to increase occupational therapists' knowledge, confidence, and capacity with building community participation and adopting community-centered practice roles. The purpose of this study is to improve occupational therapists' understanding of an approach to building community participation, through case study of a network of Canadian food security programs. Qualitative case study was utilized. Data were semistructured interviews, field observations, documents, and online social media. Thematic analysis was used to identify and describe four themes that relate to processes used to build community participation. The four themes were use of multiple methods, good leaders are fundamental, growing participation via social media, and leveraging outcomes. Occupational therapists can utilize an approach for building community participation that incorporates resource mobilization. Challenges of sustainability and social exclusion must be addressed.

  9. Analyzing the greenhouse gas impact potential of smallholder development actions across a global food security program

    Science.gov (United States)

    Grewer, Uwe; Nash, Julie; Gurwick, Noel; Bockel, Louis; Galford, Gillian; Richards, Meryl; Costa Junior, Ciniro; White, Julianna; Pirolli, Gillian; Wollenberg, Eva

    2018-04-01

    This article analyses the greenhouse gas (GHG) impact potential of improved management practices and technologies for smallholder agriculture promoted under a global food security development program. Under ‘business-as-usual’ development, global studies on the future of agriculture to 2050 project considerable increases in total food production and cultivated area. Conventional cropland intensification and conversion of natural vegetation typically result in increased GHG emissions and loss of carbon stocks. There is a strong need to understand the potential greenhouse gas impacts of agricultural development programs intended to achieve large-scale change, and to identify pathways of smallholder agricultural development that can achieve food security and agricultural production growth without drastic increases in GHG emissions. In an analysis of 134 crop and livestock production systems in 15 countries with reported impacts on 4.8 million ha, improved management practices and technologies by smallholder farmers significantly reduce GHG emission intensity of agricultural production, increase yields and reduce post-harvest losses, while either decreasing or only moderately increasing net GHG emissions per area. Investments in both production and post-harvest stages meaningfully reduced GHG emission intensity, contributing to low emission development. We present average impacts on net GHG emissions per hectare and GHG emission intensity, while not providing detailed statistics of GHG impacts at scale that are associated to additional uncertainties. While reported improvements in smallholder systems effectively reduce future GHG emissions compared to business-as-usual development, these contributions are insufficient to significantly reduce net GHG emission in agriculture beyond current levels, particularly if future agricultural production grows at projected rates.

  10. Prediction of Participation of Undergraduate University Students in a Music and Dance Master’s Degree Program

    Directory of Open Access Journals (Sweden)

    Evangelos Bebetsos

    2015-07-01

    Full Text Available The aim of the study was the investigation of students’ attitudes and intention towards their possible participation in a graduate Music and Dance Distance Learning Master’s Degree Program. The sample consisted of consisted of 229 undergraduate University students, between the ages of 20 to 63 yrs. of age (M=34.24, SD=10.70. More specifically, 134 were students of the Hellenic Open University and 95 were students of the School of Physical Education and Sport Science, of the Democritus University of Thrace. The sample completed the version the “Planned Behavior Theory” questionnaire. Results revealed differences among students of both Universities, between experienced and less experienced ones, and also among age groups. On the contrary, no sex differences in any of the questionnaire’s factors were indicated. In conclusion, the findings of this research allow a better understanding of the distance education process, which explains the attitudes and intention(s of students’ participation, and the factors that might influence theirparticular participation.

  11. Analysis and monitoring of energy security and prediction of indicator values using conventional non-linear mathematical programming

    Directory of Open Access Journals (Sweden)

    Elena Vital'evna Bykova

    2011-09-01

    Full Text Available This paper describes the concept of energy security and a system of indicators for its monitoring. The indicator system includes more than 40 parameters that reflect the structure and state of fuel and energy complex sectors (fuel, electricity and heat & power, as well as takes into account economic, environmental and social aspects. A brief description of the structure of the computer system to monitor and analyze energy security is given. The complex contains informational, analytical and calculation modules, provides applications for forecasting and modeling energy scenarios, modeling threats and determining levels of energy security. Its application to predict the values of the indicators and methods developed for it are described. This paper presents a method developed by conventional nonlinear mathematical programming needed to address several problems of energy and, in particular, the prediction problem of the security. An example of its use and implementation of this method in the application, "Prognosis", is also given.

  12. Strengthening cancer biology research, prevention, and control while reducing cancer disparities: student perceptions of a collaborative master's degree program in cancer biology, preventions, and control.

    Science.gov (United States)

    Jillson, I A; Cousin, C E; Blancato, J K

    2013-09-01

    This article provides the findings of a survey of previous and current students in the UDC/GU-LCCC master's degree program. This master's degree program, Cancer Biology, Prevention, and Control is administered and taught jointly by faculty of a Minority Serving Institution, the University of the District of Columbia, and the Lombardi Comprehensive Cancer Center to incorporate the strengths of a community-based school with a research intensive medical center. The program was initiated in 2008 through agreements with both University administrations and funding from the National Cancer Institute. The master's degree program is 36 credits with a focus on coursework in biostatistics, epidemiology, tumor biology, cancer prevention, medical ethics, and cancer outreach program design. For two semesters during the second year, students work full-time with a faculty person on a laboratory or outreach project that is a requirement for graduation. Students are supported and encouraged to transition to a doctoral degree after they obtain the master's and many of them are currently in doctorate programs. Since the inception of the program, 45 students have initiated the course of study, 28 have completed the program, and 13 are currently enrolled in the program. The survey was designed to track the students in their current activities, as well as determine which courses, program enhancements, and research experiences were the least and most useful, and to discern students' perceptions of knowledge acquired on various aspects of Cancer Biology Prevention, and Control Master's Program. Thirty of the 35 individuals to whom email requests were sent responded to the survey, for a response rate of 85.7%. The results of this study will inform the strengthening of the Cancer Biology program by the Education Advisory Committee. They can also be used in the development of comparable collaborative master's degree programs designed to address the significant disparities in prevalence of

  13. Connected Vehicle Pilot Deployment Program phase 1 : security management operating concept : New York City : final report.

    Science.gov (United States)

    2016-05-18

    This document describes the Security Management Operating Concept (SMOC) for the New York City Department of Transportation (NYCDOT) Connected Vehicle Pilot Deployment (CVPD) Project. This SMOC outlines the security mechanisms that will be used to pr...

  14. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    Energy Technology Data Exchange (ETDEWEB)

    Barbara McCabe; John Kovach

    2009-03-30

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  15. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  16. Financial Sector Assessment Program : Malaysia - IOSCO Objectives and Principles of Securities Regulation

    OpenAIRE

    World Bank; International Monetary Fund

    2013-01-01

    The Securities Commission Malaysia (SC), as the supervisor of the capital markets, has developed a robust supervisory framework that exhibits high levels of implementation of the International Organization of Securities Commissions Objectives and Principles of Securities Regulation (IOSCO Principles) in most areas. The SC's independence will be buttressed by some changes to the legal provi...

  17. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  18. Self-reported leadership styles of deans of baccalaureate and higher degree nursing programs in the United States.

    Science.gov (United States)

    Broome, Marion E

    2013-01-01

    Over the past decade there has been a lack of attention in the discipline paid to developing strong academic leaders. It is widely acknowledged that the role of the dean has shifted dramatically over the past two decades, with an increasing emphasis on interaction with and accountability to external constituencies at the university, community, and national levels. The overall purpose of this study was to investigate the self-reported leadership styles, behaviors, and experiences of deans of schools of nursing in the United States. The Multifactor Leadership Questionnaire (MLQ) was sent to 655 deans who were members of the American Association of Colleges of Nursing; 344 returned completed surveys for a return rate of 52.5%. Scores on the transformational scale (n = 321; 20 items) ranged from 2.75 to 4.0, with a mean of 3.79; transactional scores ranged from 1.3 to 4.0, with a mean of 3.3 and mode of 3.5. The passive leadership component was lowest, with a range of 0 to 3.75, mean of 1.1, and mode of 1.0. The highest scores for each dean were then examined and compared across the three components. Seventy-seven percent of the deans' highest scores fell on the transformational, 21% on the transactional, and 2% on the passive-avoidant scale. There were no significant differences in the most commonly reported leadership behaviors by gender, ethnicity, or terminal degree. Deans of nursing, compared with over 3,000 other leaders who have completed the MLQ, ranked in the 80th percentile for self-reported transformative behaviors and outcomes effectiveness. The findings from this sample, who were predominantly female, are congruent with previous research on women leaders. Recommendations for future research leadership development programs are presented. © 2013.

  19. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  20. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  1. Family conflict, emotional security, and child development: translating research findings into a prevention program for community families.

    Science.gov (United States)

    Cummings, E Mark; Schatz, Julie N

    2012-03-01

    The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.

  2. 32 CFR 728.44 - Members of security assistance training programs, foreign military sales, and their ITO...

    Science.gov (United States)

    2010-07-01

    ..., foreign military sales, and their ITO authorized dependents. 728.44 Section 728.44 National Defense... § 728.44 Members of security assistance training programs, foreign military sales, and their ITO... patient is an ITO authorized dependent), grade or rate, country of origin, diagnosis, type of elective...

  3. Distance education program for a master´s degree on teachers education at the high school level organized by UNAM (National University Of Mexico

    Directory of Open Access Journals (Sweden)

    Francisco Javier Sierra Vázquez

    2005-06-01

    Full Text Available The general characteristics of the Master’s degree program MADEMS and the strategic actions required to organize the distance education program are described. The possibilities for generalization and collaboration with high schools and colleges in Mexico and in other countries are examined. Furthermore, the implications of this program in the context of educational spaces in which our institution is involved are also considered. This is done by taking into account that this program provides a multidisciplinary model with a multiplicative effect and that it is also a project which contributes to education, training, innovation, cooperation and development.

  4. Four-Year Effects on Degree Receipt and Employment Outcomes from a Performance-Based Scholarship Program in Ohio

    Science.gov (United States)

    Mayer, Alexander K.; Patel, Reshma; Gutierrez, Melvin

    2015-01-01

    A college degree is often viewed as a key step toward better employment and higher earnings. Many community college students, however, never graduate and cannot reap the financial benefits associated with a college degree. Although existing research suggests that financial aid interventions can modestly improve students' short-term academic…

  5. Exploring the Value of MBA Degrees: Students' Experiences in Full-Time, Part-Time, and Executive MBA Programs

    Science.gov (United States)

    Bruce, Grady D.

    2010-01-01

    Critics of the overall value of the MBA have not systematically considered the attitudes of MBA students about the value of their degree. The author used data from a large sample of graduates (N = 16,268) to do so, and to explore predictors of overall degree value. The author developed separate regression models for full-time, part-time, and…

  6. Effectiveness of a Selective Advising Program in Reducing the Degree of Compulsive Buying Behavior among Umm Al-Qura Female Students

    Science.gov (United States)

    Basyouni, Sawzan S.

    2018-01-01

    The present study is an attempt to investigate the effectiveness of a selective advising program in reducing the degree of Compulsive Buying Behavior among female students, Faculty of Education at Umm al-Qura University. The sample consisted of (200) female students to verify the validity and reliability of the tool. The quasi-experimental method…

  7. Veteran Student Persistence: The Lived Experiences of Veteran Students Coping with Post-Traumatic Stress Disorder While Enrolled in Online Degree Programs

    Science.gov (United States)

    Henderson-White, Mary

    2017-01-01

    Persistence as it pertained to traditional college students had been widely researched, but little was known about persistence and the role of resilience and engagement for veteran students experiencing post-traumatic stress disorder while enrolled in online degree programs. The focus of the study was to understand the lived experiences of veteran…

  8. An Application of Break-Even Analysis To Determine the Costs Associated with the Implementation of an Off-Campus Bachelor Degree Completion Program.

    Science.gov (United States)

    Satterlee, Brian

    This paper applies the management science tool of break-even analysis to determine the costs of implementing an off-campus bachelor degree completion program at a four-year private liberal arts college. The first section describes break-even analysis which, in this application, is calculated by dividing the total annual cost for a cohort of…

  9. Development of teaching materials on "Environmental risk assessment" in English for master students Double Degree program "Ecology and natural resource management"

    OpenAIRE

    Осипова, Нина Александровна; Матвеенко, Ирина Алексеевна

    2014-01-01

    The experience in development of learning package for teaching courses in joint Master curricula in English is presented. The developed teaching manuals on “Environmental Risk Assessment” in English for 347 Master students learning joint Double Degree Program of TPU and Paris-11 University reflects the international experience accumulated in this sphere taking into account the latest scientific achievements.

  10. Assessment of the Groundwater Protection Program Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    2005-01-01

    The following report contains an assessment of the Y-12 Groundwater Protection Program (GWPP) for the Y-12 National Security Complex at the Oak Ridge Reservation, Tennessee. The GWPP is administered by BWXT Y-12, L.L.C. for the purpose of groundwater surveillance monitoring. After over 20 years of extensive site characterization and delineation efforts, groundwater in the three hydrogeologic areas that comprise the Y-12 Complex requires a long-term monitoring network strategy that will efficiently satisfy surveillance monitoring objectives set forth in DOE Order 450.1. The GWPP assessment consisted of two phases, a qualitative review of the program and a quantitative evaluation of the groundwater monitoring network using the Monitoring and Remediation Optimization System (MAROS) software methodology. The specific objective of the qualitative section of the review of the GWPP was to evaluate the methods of data collection, management, and reporting and the function of the monitoring network for the Y-12 facility using guidance from regulatory and academic sources. The results of the qualitative review are used to suggest modifications to the overall program that would be consistent with achieving objectives for long-term groundwater monitoring. While cost minimization is a consideration in the development of the monitoring program, the primary goal is to provide a comprehensive strategy to provide quality data to support site decision making during facility operations, long-term resource restoration, and property redevelopment. The MAROS software is designed to recommend an improved groundwater monitoring network by applying statistical techniques to existing historic and current site analytical data. The MAROS methodology also considers hydrogeologic factors, regulatory framework, and the location of potential receptors. The software identifies trends and suggests components for an improved monitoring plan by analyzing individual monitoring wells in the current

  11. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  12. Enhancing effectiveness of agriculture group in supporting government program to increase food security

    Science.gov (United States)

    Retnowati, Daru; Subarjo, A. H.

    2018-05-01

    Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.

  13. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  14. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  15. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  16. Distance education in dental hygiene bachelor of science degree completion programs: As perceived by students and faculty

    Science.gov (United States)

    Tsokris, Maureen

    This study investigated student and faculty perceptions of their experiences with online learning in dental hygiene Bachelor of Science degree completion programs on the dimensions of: quality of learning, connectedness to the learning environment, technology factors and student satisfaction. The experiences of dental hygiene students who took their core BS dental hygiene (BSDH) courses completely online were compared and contrasted with the perceptions of dental hygiene students who had taken a portion of the BSDH courses online and a portion in a traditional face-to-face classroom setting. Furthermore, this study compared and contrasted the perceptions of faculty on these same four dimensions based on the position held by the faculty member and the course format they are teaching in: online or a combination of online and a traditional face-to-face classroom setting. This study revealed several important differences and similarities between students who had taken their courses online and those who had taken a portion of the BSDH courses online and a portion in a traditional face-to-face classroom setting. The results showed students who had taken their courses online described factors related to the instructor as important to the quality of the learning experience such as: the experience and qualifications of the professor, the examples they provided and the instructors prompt response to questions. Students who had taken courses in both formats described factors related to the amount of effort they put into the course, their classmates' preparedness, the course materials and assignments as important to the quality of the learning experience. Although students who completed courses online reported difficulty participating in group activities, they were more positive regarding the level of interaction they experienced with their classmates online Findings indicated students who had taken their courses in both formats would have liked more opportunities to interact

  17. If You Build It, Will They Come? Tales of Developing a New Degree Program in Actuarial Science

    Science.gov (United States)

    Marano, Lisa E.

    2014-01-01

    In 2007, the B.S. in Applied Mathematics program consisting of five concentrations, including Actuarial Science, began at West Chester University of Pennsylvania, and we graduated our first class (of one) that December. We describe our program, some ideas to consider when planning your own program, and share some of the successes of our program…

  18. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    Science.gov (United States)

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  19. HRD Degrees.

    Science.gov (United States)

    Geber, Beverly

    1987-01-01

    The author describes the growing movement toward accreditation for human resources development professionals. She covers the issue of diversity, undergraduate versus graduate degrees, and future trends. (CH)

  20. From DDR to Security Promotion: Connecting national programs to community initiatives

    NARCIS (Netherlands)

    Verkoren, W.; Willems, R.C.; Kleingeld, J.; Rouw, H.

    2010-01-01

    Disarmament, demobilization and reintegration (DDR) is a set of activities that forms part of strategies for peacebuilding after civil war. DDR has become the standard way of addressing security threats in immediate post-conflict situations. However, DDR is designed to promote national security,

  1. 76 FR 31971 - New Agency Information Collection Activity Under OMB Review: Security Program for Hazardous...

    Science.gov (United States)

    2011-06-02

    ... Carrier Division will be producing a voluntary security-related training course for the Hazmat motor... voluntary security-related training course to the Hazardous Materials (Hazmat) motor carrier and shipper... using appropriate automated, electronic, mechanical, or other technological collection techniques or...

  2. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  3. A MATLAB-based graphical user interface program for computing functionals of the geopotential up to ultra-high degrees and orders

    Science.gov (United States)

    Bucha, Blažej; Janák, Juraj

    2013-07-01

    We present a novel graphical user interface program GrafLab (GRAvity Field LABoratory) for spherical harmonic synthesis (SHS) created in MATLAB®. This program allows to comfortably compute 38 various functionals of the geopotential up to ultra-high degrees and orders of spherical harmonic expansion. For the most difficult part of the SHS, namely the evaluation of the fully normalized associated Legendre functions (fnALFs), we used three different approaches according to required maximum degree: (i) the standard forward column method (up to maximum degree 1800, in some cases up to degree 2190); (ii) the modified forward column method combined with Horner's scheme (up to maximum degree 2700); (iii) the extended-range arithmetic (up to an arbitrary maximum degree). For the maximum degree 2190, the SHS with fnALFs evaluated using the extended-range arithmetic approach takes only approximately 2-3 times longer than its standard arithmetic counterpart, i.e. the standard forward column method. In the GrafLab, the functionals of the geopotential can be evaluated on a regular grid or point-wise, while the input coordinates can either be read from a data file or entered manually. For the computation on a regular grid we decided to apply the lumped coefficients approach due to significant time-efficiency of this method. Furthermore, if a full variance-covariances matrix of spherical harmonic coefficients is available, it is possible to compute the commission errors of the functionals. When computing on a regular grid, the output functionals or their commission errors may be depicted on a map using automatically selected cartographic projection.

  4. Fast and Focused: Accelerated Degree Programs Keep Students Locked in on Learning. Lumina Foundation Focus™. Fall 2013

    Science.gov (United States)

    Giegerich, Steve

    2013-01-01

    Employers point to a large and growing "skills gap," saying thousands of jobs are already going unfilled because applicants lack the skills and knowledge they need. Forecasters say that, by the end of this decade, two-thirds of all jobs will require some form of high-quality postsecondary credential such as a degree or certificate. The…

  5. 2008 Key Student Outcomes Indicators for BC Diploma, Associate Degree, and Certificate Programs: Survey Results by Institution

    Science.gov (United States)

    Ministry of Advanced Education and Labour Market Development, 2009

    2009-01-01

    The BC Diploma, Associate Degree, and Certificate Student Outcomes (DACSO) Survey (formerly the BC College and Institute Student Outcomes Survey) collects and disseminates information about former students' post-secondary experiences and their subsequent labour market and further education experiences. The survey is administered annually to former…

  6. The Use of Expert Judgment in the Assessment of Demonstrated Learning in the Antioch College-Yellow Springs Adult Degree Completion Program. CAEL Institutional Report No. 1. Antioch College.

    Science.gov (United States)

    Lewis, Robert

    The implementation of the Adult Degree Completion Program (ADCP) at Antioch-Yellow Springs is described. The ADCP is a transfer program designed to enable adults who have never finished colege to complete their undergraduate degree work, often without having to abandon their obligations to families or to professions. To enroll in the program,…

  7. Teaching Translational Research to Medical Students: The New York University School of Medicine's Master's of Science in Clinical Investigation Dual‐Degree Program

    Science.gov (United States)

    Pillinger, Michael; Plottel, Claudia S.; Galeano, Claudia; Maddalo, Scott; Hochman, Judith S.; Cronstein, Bruce N.; Gold‐von Simson, Gabrielle

    2015-01-01

    Abstract To develop the next generation of translational investigators, New York University School of Medicine (NYUSOM) and the NYU‐NYC Health and Hospitals Corporation Clinical and Translational Science Institute (NYU‐HHC CTSI) developed the Master's of Science in Clinical Investigation dual‐degree (MD/MSCI) program. This 5‐year program dedicates 1 year to coursework and biomedical research, followed by a medical school/research overlap year, to prepare students for academic research careers. This paper details the MD/MSCI program's curriculum and approach to mentorship, describes the research/professional interests of students, and reports student productivity. In the first 4 years of the program (2010–2014) 20 students were matriculated; 7 (35%) were women, and 12 (60%) research projects were in surgical specialties. To date, 14 students have applied to residency, and half pursued surgical residency programs. Our students have produced 68 accepted abstracts, 15 abstracts in submission, 38 accepted papers, and 24 papers in submission. Despite the time‐limited nature of this program, additional training in research design and implementation has promoted a high level of productivity. We conclude that dual‐degree training in medicine and translational research is feasible for medical students and allows for meaningful participation in valuable projects. Follow‐up is warranted to evaluate the academic trajectory of these students. PMID:26365704

  8. Teaching Translational Research to Medical Students: The New York University School of Medicine's Master's of Science in Clinical Investigation Dual-Degree Program.

    Science.gov (United States)

    Gillman, Jennifer; Pillinger, Michael; Plottel, Claudia S; Galeano, Claudia; Maddalo, Scott; Hochman, Judith S; Cronstein, Bruce N; Gold-von Simson, Gabrielle

    2015-12-01

    To develop the next generation of translational investigators, New York University School of Medicine (NYUSOM) and the NYU-NYC Health and Hospitals Corporation Clinical and Translational Science Institute (NYU-HHC CTSI) developed the Master's of Science in Clinical Investigation dual-degree (MD/MSCI) program. This 5-year program dedicates 1 year to coursework and biomedical research, followed by a medical school/research overlap year, to prepare students for academic research careers. This paper details the MD/MSCI program's curriculum and approach to mentorship, describes the research/professional interests of students, and reports student productivity. In the first 4 years of the program (2010-2014) 20 students were matriculated; 7 (35%) were women, and 12 (60%) research projects were in surgical specialties. To date, 14 students have applied to residency, and half pursued surgical residency programs. Our students have produced 68 accepted abstracts, 15 abstracts in submission, 38 accepted papers, and 24 papers in submission. Despite the time-limited nature of this program, additional training in research design and implementation has promoted a high level of productivity. We conclude that dual-degree training in medicine and translational research is feasible for medical students and allows for meaningful participation in valuable projects. Follow-up is warranted to evaluate the academic trajectory of these students. © 2015 Wiley Periodicals, Inc.

  9. Report: FISMA - Fiscal Year 2004 Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2004-S-00007, September 30, 2004. This report synopsizes the results of information technology security work the U.S. Environmental Protection Agency’s Office of Inspector General (OIG) performed during Fiscal Year (FY) 2004.

  10. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  11. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  12. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Science.gov (United States)

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  13. Disease management 360 degrees: a scorecard approach to evaluating TRICARE's programs for asthma, congestive heart failure, and diabetes.

    Science.gov (United States)

    Yang, Wenya; Dall, Timothy M; Zhang, Yiduo; Hogan, Paul F; Arday, David R; Gantt, Cynthia J

    2010-08-01

    To assess the effect of TRICARE's asthma, congestive heart failure, and diabetes disease management programs using a scorecard approach. EVALUATION MEASURES: Patient healthcare utilization, financial, clinical, and humanistic outcomes. Absolute measures were translated into effect size and incorporated into a scorecard. Actual outcomes for program participants were compared with outcomes predicted in the absence of disease management. The predictive equations were established from regression models based on historical control groups (n = 39,217). Z scores were calculated for the humanistic measures obtained through a mailed survey. Administrative records containing medical claims, patient demographics and characteristics, and program participation status were linked using an encrypted patient identifier (n = 57,489). The study time frame is 1 year prior to program inception through 2 years afterward (October 2005-September 2008). A historical control group was identified with the baseline year starting October 2003 and a 1-year follow-up period starting October 2004. A survey was administered to a subset of participants 6 months after baseline assessment (39% response rate). Within the observation window--24 months for asthma and congestive heart failure, and 15 months for the diabetes program--we observed modest reductions in hospital days and healthcare cost for all 3 programs and reductions in emergency visits for 2 programs. Most clinical outcomes moved in the direction anticipated. The scorecard provided a useful tool to track performance of 3 regional contractors for each of 3 diseases and over time.

  14. Advancing the Integration of Population Medicine into Medical Curricula at The Warren Alpert Medical School of Brown University: A New Master's Degree Program.

    Science.gov (United States)

    Mello, Michael J; Feller, Edward; George, Paul; Borkan, Jeffrey

    2015-09-01

    Additional knowledge, attitudes and skills are required for the next generation of medical students as they expand the traditional focus on individual patients to include population-based health and scholarly investigation. The Warren Alpert Medical School of Brown University (AMS) is initiating a master's degree program as a key component of the new Primary Care-Population Medicine program at AMS leading to both a Doctorate in Medicine (MD) and Master of Science in Population Medicine (ScM) degrees in four years. The ScM is composed of a series of nine courses, integrated into the four-year MD curriculum, as well as a thesis. Additional attention will be given to leadership and quality improvement training. The goal is to produce graduates competent in the care of individual patients, panels, communities, and populations.

  15. The Port Security Grant Program: Good Enough, or Can it be Made Better

    Science.gov (United States)

    2016-06-01

    Statement of William O. Jenkins , Jr., Director Homeland Security and Justice, GAO 12-526T (Washington, DC, 2012) 4- 11, http://www.gao.gov/assets/590...127 de Rugy, “What Does Homeland Security Spending Buy?,” 13. 128 Yacov Haimes, Joost Santos, Kenneth Crowther, Matthew Henry ...Preparedness Grants and Assessing National Capabilities: Continuing Challenges Impede FEMA’s Progress, Statement of William O. Jenkins , Jr

  16. International Dimensions of Nursing and Health Care in Baccalaureate and Higher Degree Nursing Programs in the United States.

    Science.gov (United States)

    Mooneyhan, Esther L.; And Others

    1986-01-01

    Results of a national survey of undergraduate and graduate nursing programs to determine the extent of curriculum content and faculty training in international health issues are reported. The importance of this aspect of nursing education is discussed. (MSE)

  17. Using the Five Senses of Success framework to understand the experiences of midwifery students enroled in an undergraduate degree program.

    Science.gov (United States)

    Sidebotham, M; Fenwick, J; Carter, A; Gamble, J

    2015-01-01

    developing a student's sense of capability, purpose, resourcefulness, identity and connectedness (five-senses of success) are key factors that may be important in predicting student satisfaction and progression within their university program. the study aimed to examine the expectations and experiences of second and third year midwifery students enroled in a Bachelor of Midwifery program and identify barriers and enablers to success. a descriptive exploratory qualitative design was used. Fifty-six students enroled in either year 2 or 3 of the Bachelor of Midwifery program in SE Queensland participated in an anonymous survey using open-ended questions. In addition, 16 students participated in two year-level focus groups. Template analysis, using the Five Senses Framework, was used to analyse the data set. early exposure to 'hands on' clinical midwifery practice as well as continuity of care experiences provided students with an opportunity to link theory to practice and increased their perception of capability as they transitioned through the program. Students' sense of identity, purpose, resourcefulness, and capability was strongly influenced by the programs embedded meta-values, including a 'woman centred' approach. In addition, a student's ability to form strong positive relationships with women, peers, lecturers and supportive clinicians was central to developing connections and ultimately a sense of success. A sense of connection not only fostered an ongoing belief that challenges could be overcome but that students themselves could initiate or influence change. the five senses framework provided a useful lens through which to analyse the student experience. Key factors to student satisfaction and retention within a Bachelor of Midwifery program include: a clearly articulated midwifery philosophy, strategies to promote student connectedness including the use of social media, and further development of clinicians' skills in preceptorship, clinical teaching and

  18. Y-12 National Security Complex Biological Monitoring And Abatement Program 2008 Calendar Year Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M. J.; Greeley Jr., M. S.; Mathews, T. J.; Morris, G. W.; Roy, W. K.; Ryon, M. G.; Smith, J. G.; Southworth, G. R.

    2009-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off

  19. Y-12 Groundwater Protection Program CY 2009 Triennial Report Of The Monitoring Well Inspection And Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspection events conducted on active and inactive wells at Y-12 during calendar years (CY) 2007 through 2009; it documents well maintenance and plugging and abandonment activities completed since the last triennial inspection event (CY 2006); and provides summary tables of well inspection events, well maintenance events, and well plugging and abandonment events during the reference time period.

  20. Nevada National Security Site 2014 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, David [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States)

    2015-02-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2014 results. Analysis results for leachate contaminants collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included. During 2014, groundwater samples were collected and static water levels were measured at three wells surrounding the Area 5 RWMS. Groundwater samples were collected at wells UE5PW-1, UE5PW-2, and UE5PW-3 on March 11 and August 12, 2014, and static water levels were measured at each of these wells on March 10, June 2, August 11, and October 14, 2014. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. General water chemistry (cations and anions) was also measured. Results from samples collected in 2014 are within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. The data from the shallow aquifer indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS, and there were no significant changes in measured groundwater parameters compared to previous years. Leachate from above the primary liner of Cell 18 drains into a sump and is collected in a tank at the ground surface. Cell 18 began receiving waste in January 2011. Samples were collected from the tank when the leachate volume approached the 3,000-gallon tank capacity. Leachate samples have been collected 16 times since January 2011. During 2014, samples were collected on February 25, March 5, May 20, August 12, September 16, November 11, and December 16. Each leachate sample was

  1. SITREP: The NPS Maritime Defense and Security Research Program Newsletter ; v. 48 (July-August 2010)

    OpenAIRE

    2010-01-01

    This issue of The NPS Maritime Domain Protection Newsletter includes information on The Technology Cooperation Program (TTCP) Maritime (MAR), RAND Corporation Maritime Programs, Librarians Corner, and Future Events.

  2. Factors associated with household food security of participants of the MANA food supplement program in Colombia.

    Science.gov (United States)

    Hackett, Michelle; Melgar-Quiñonez, Hugo; Taylor, Christopher A; Alvarez Uribe, Martha Cecilia

    2010-03-01

    The objective of this study was to explore demographic and economic characteristics associated with household food security of 2,784 low-income households with pre-school aged children receiving food supplements from the Colombian Plan for Improving Food and Nutrition in Antioquia - MANA (Mejoramiento Alimentario y Nutricional de Antioquia) in the Department of Antioquia, Colombia. Included in the study was a 12-item household food security survey was collected from a cross-sectional, stratified random sample of MANA participants in which households were characterized as food secure, mildly food insecure, moderately food insecure, and severely food insecure. It was hypothesized that household food security status would be strongly associated with demographic characteristics, food expenditure variables, and food supplement consumption by children in MANA. Food insecure households were characterized by more members, older parents, and lower income (p < 0.0001). Rural residence and female head of households had higher rates of food insecurity (p < 0.01). Food insecure households had the lowest monthly expenditures food (p < 0.0001). Severely food insecure households saved the highest percentage of per capita food expenditure from consuming MANA supplements (p < 0.0001), similarly, MANA food supplement intakes were greatest in households reporting the most food insecurity (p < 0.001). The results of this study are important to describe characteristics of the population benefiting from the MANA nutrition intervention by their unique level of household food security status.

  3. Y-12 National Security Complex Biological Monitoring and Abatement Program 2007 Calendar Yeare Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M.J.; Greeley, M. S. Jr.; Morris, G. W.; Roy, W. K.; Ryan, M. G.; Smith, J. G.; Southworth, G. R.

    2008-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located

  4. Evaluating Security Assistance Programs: Performance Evaluation and the Expanded International Military Education and Training (E-IMET) Program

    National Research Council Canada - National Science Library

    Calhoun, Todd

    1998-01-01

    In 1991 the International Military Education and Training (IMET) program was expanded to include training programs focusing on civilian control over the military, respect for human rights, and responsible defense resource management...

  5. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  6. Evaluation Use and Involvement of Internal Stakeholders: The Case of a New Non-Degree Online Program in Brazil

    Science.gov (United States)

    Cornachione, Edgard B., Jr.; Trombetta, Maria R.; Casa Nova, Silvia P. C.

    2010-01-01

    To what extent does the intense and direct involvement of internal stakeholders, such as program managers and staff members, play a significant role toward evaluation use? Stakeholder involvement is a key element in evaluation and evaluation use is considered within a broader sense that includes organizational knowledge, individual skills, and…

  7. The Readiness of Lecturers in Embedding Soft Skills in the Bachelor's Degree Program in Malaysian Institutes of Teacher Education

    Science.gov (United States)

    Hassan, Aminuddin; Maharoff, Marina; Abiddin, Norhasni Zainal

    2014-01-01

    This is a preliminary research to obtain information to formulate a problem statement for an overall study of the embedding of soft skills in the program courses in higher learning institutions. This research was conducted in the form of single case and multi-case studies. The research data was attained through mixed methods; the quantitative…

  8. End-to-End Verification of Information-Flow Security for C and Assembly Programs

    Science.gov (United States)

    2016-04-01

    seL4 security verification [18] avoids this issue in the same way. In that work, the authors frame their solution as a restriction that disallows...identical: (σ, σ′1) ∈ TM ∧ (σ, σ′2) ∈ TM =⇒ Ol(σ′1) = Ol(σ′2) The successful security verifications of both seL4 and mCertiKOS provide reasonable...evidence that this restriction on specifications is not a major hindrance for usability. Unlike the seL4 verification, however, our framework runs into a

  9. Best practices of internationalization of the Higher Education in Asia-Pacific: The case of management of a double degree program

    Directory of Open Access Journals (Sweden)

    Félix Rogelio Flores

    2012-09-01

    Full Text Available The challenges of nations from Asia and the Pacific to create sustainable and economic spaces, have led their people to seek new educative mechanisms to forge from their childhood and youth, more competitive people, generators of wealth; as an example, China, Korea and India, being the internationalization the best example. This article presents a brief overview of the major events that have given way to new patterns of mobility and internationalization of Umap since its inception in 1993 until today. We present the case of the school of marketing in which outlines the learning, as a result of the institutional efforts of a double degree program with a University of the Umap program, this will allow to identify areas of prospect to establish improvements in an internationalization program of any Institution of higher education that aspire to any position in the global context.

  10. Integrated Food and Nutrition Security Programming to Address Undernutrition : The Plan Approach

    NARCIS (Netherlands)

    Boer, de F.A.; Verdonk, I.

    2012-01-01

    From a technical point of view, it is widely recognised that an integrated approach to food and nutrition security is an effective way to promote child nutritional well-being. In this desk review, based on project documents of the countries which took part in the PLAN NL supported Food and Nutrition

  11. The Social Security Program and the Private Sector Alternative: Lessons from History.

    Science.gov (United States)

    Quadagno, Jill

    1987-01-01

    Used historical evidence to analyze how private sector benefits worked in the past in light of the debate surrounding the Social Security benefits and the federal deficit. Among conclusions reached are that the private sector failed to provide adequate protection for older citizens, and that benefits were inequitably distributed on basis of gender…

  12. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Science.gov (United States)

    Boutnaru, Shlomi; Hershkovitz, Arnon

    2015-01-01

    In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…

  13. Quantum secure communication models comparison

    Directory of Open Access Journals (Sweden)

    Georgi Petrov Bebrov

    2017-12-01

    Full Text Available The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality.

  14. Y-12 Groundwater Protection Program CY2012 Triennial Report Of The Monitoring Well Inspection And Maintenance Program Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-09-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tables of well inspections and well maintenance activities during the reference time period.

  15. Degree of vertical integration between the undergraduate program and clinical internship with respect to cervical and cranial diagnostic and therapeutic procedures taught at the canadian memorial chiropractic college.

    Science.gov (United States)

    Leppington, Charmody; Gleberzon, Brian; Fortunato, Lisa; Doucet, Nicolea; Vandervalk, Kyle

    2012-01-01

    The purpose of this study was to determine if diagnostic and therapeutic procedures for the cervical and cranial spine taught to students during the undergraduate program at Canadian Memorial Chiropractic College are required to be used during their internship by their supervising clinicians and, if so, to what extent these procedures are used. Course manuals and course syllabi from the Applied Chiropractic and Clinical Diagnosis faculty of the undergraduate chiropractic program for the academic year 2009-2010 were consulted and a list of all diagnostic and therapeutic procedures for the cranial and cervical spine was compiled. This survey asked clinicians to indicate if they themselves used or if they required the students they were supervising to use each procedure listed and, if so, to what extent each procedure was used. Demographic information of each clinician was also obtained. In general, most diagnostic procedures of the head and neck were seldom used, with the exception of postural observation and palpation. By contrast, most cervical orthopaedic tests were often used, with the exception of tests for vertigo. Most therapeutic procedures were used frequently with the exception of prone cervical and "muscle" adjustments. There was a low degree of vertical integration for cranial procedures as compared to a much higher degree of vertical integration for cervical procedures between the undergraduate and clinical internship programs taught. Vertical integration is an important element of curricular planning and these results may be helpful to aid educators to more appropriately allocate classroom instruction.

  16. Investigating approaches to diversity in a national survey of physics doctoral degree programs: The graduate admissions landscape

    Science.gov (United States)

    Potvin, Geoff; Chari, Deepa; Hodapp, Theodore

    2017-12-01

    Graduate admissions play a critical gatekeeping role in the physics community not only because they select students who are allowed to begin their graduate studies, but also because they influence how students perceive graduate school, and in some cases whether or not they will even choose to apply. In conjunction with the APS Bridge Program, we conducted a national survey of graduate directors (and related faculty) of physics Ph.D. programs in the United States to explore graduate admissions practices. Our focus was on criteria used in determining admissions, mechanisms through which graduate applicants are handled, and how student representation considerations are incorporated into admissions (if at all). We report here on existing graduate admission practices in physics departments and highlight some critical issues for understanding barriers for diversifying graduate physics, including the use of GRE scores (and the relative importance placed on them). We find that the use of a minimum GRE score for admission, a practice in opposition to recommendations made by the tests designers, is reported to be used in many departments (more than one in three). We also find letters of recommendation to be highly valued in admissions decisions. Our data describe various initiatives at the institutional or individual level to increase gender diversity in admissions. A sizable number of departments also express a latent demand for greater numbers of students from traditionally marginalized racial or ethnic groups, but simultaneously report a lack of such applicants.

  17. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Science.gov (United States)

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  18. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  19. Non-proliferation, safeguards, and security for the fissile materials disposition program immobilization alternatives

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, R.A.; Jaeger, C.D.; Tolk, K.M. [Sandia National Labs., Albuquerque, NM (United States); Moore, L.R. [Lawrence Livermore National Lab., CA (United States)

    1996-05-01

    The Department of Energy is analyzing long-term storage and disposition alternatives for surplus weapons-usable fissile materials. A number of different disposition alternatives are being considered. These include facilities for storage, conversion and stabilization of fissile materials, immobilization in glass or ceramic material, fabrication of fissile material into mixed oxide (MOX) fuel for reactors, use of reactor based technologies to convert material into spent fuel, and disposal of fissile material using geologic alternatives. This paper will focus on how the objectives of reducing security and proliferation risks are being considered, and the possible facility impacts. Some of the areas discussed in this paper include: (1) domestic and international safeguards requirements, (2) non-proliferation criteria and measures, (3) the threats, and (4) potential proliferation, safeguards, and security issues and impacts on the facilities. Issues applicable to all of the possible disposition alternatives will be discussed in this paper. However, particular attention is given to the plutonium immobilization alternatives.

  20. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  1. Maritime Defense and Security Research Program: Final Report, 2004-2011

    Science.gov (United States)

    2011-11-01

    Security: airports, military bases, heads of state, Super Bowl Critical Project Management Most recently, CID completed an analysis of the Hawaiian...to link the results, i.e. discovered keywords, back to the original documents for validation. Also the big picture needs to be updated and enhanced...and Network Layers using OPNET,‖ Proc. TTCP TP-9 ASW Systems & Technologies Panel Annual Meeting, Dartmouth, Nova Scotia, Canada, September 21-25

  2. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    security S&T, and facilitate commercialisation of research outcomes for national benefit. The policy will be delivered through a coherent and...our economy and higher living and education standards1,2. Questions for discussion: Q2.1 Are there other imperatives or drivers that justify the...organisations can drive the uptake of new technology and knowledge. Second, private sector organisations are essential to the commercialisation of

  3. Applying the system engineering approach to devise a master’s degree program in space technology in developing countries

    Science.gov (United States)

    Jazebizadeh, Hooman; Tabeshian, Maryam; Taheran Vernoosfaderani, Mahsa

    2010-11-01

    Although more than half a century is passed since space technology was first developed, developing countries are just beginning to enter the arena, focusing mainly on educating professionals. Space technology by itself is an interdisciplinary science, is costly, and developing at a fast pace. Moreover, a fruitful education system needs to remain dynamic if the quality of education is the main concern, making it a complicated system. This paper makes use of the System Engineering Approach and the experiences of developed countries in this area while incorporating the needs of the developing countries to devise a comprehensive program in space engineering at the Master's level. The needs of the developing countries as regards space technology education may broadly be put into two categories: to raise their knowledge of space technology which requires hard work and teamwork skills, and to transfer and domesticate space technology while minimizing the costs and maximizing its effectiveness. The requirements of such space education system, which include research facilities, courses, and student projects are then defined using a model drawn from the space education systems in universities in North America and Europe that has been modified to include the above-mentioned needs. Three design concepts have been considered and synthesized through functional analysis. The first one is Modular and Detail Study which helps students specialize in a particular area in space technology. Second is referred to as Integrated and Interdisciplinary Study which focuses on understanding and development of space systems. Finally, the third concept which has been chosen for the purpose of this study, is a combination of the other two, categorizing the required curriculum into seven modules, setting aside space applications. This helps students to not only specialize in one of these modules but also to get hands-on experience in a real space project through participation in summer group

  4. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  5. Prediction of Basic Math Course Failure Rate in the Physics, Meteorology, Mathematics, Actuarial Sciences and Pharmacy Degree Programs

    Directory of Open Access Journals (Sweden)

    Luis Rojas-Torres

    2014-09-01

    Full Text Available This paper summarizes a study conducted in 2013 with the purpose of predicting the failure rate of math courses taken by Pharmacy, Mathematics, Actuarial Science, Physics and Meteorology students at Universidad de Costa Rica (UCR. Using the Logistics Regression statistical techniques applied to the 2010 cohort, failure rates were predicted of students in the aforementioned programs in one of their Math introductory courses (Calculus 101 for Physics and Meteorology, Math Principles for Mathematics and Actuarial Science and Applied Differential Equations for Pharmacy. For these models, the UCR admission average, the student’s genre, and the average correct answers in the Quantitative Skills Test were used as predictor variables. The most important variable for all models was the Quantitative Skills Test, and the model with the highest correct classification rate was the Logistics Regression. For the estimated Physics-Meteorology, Pharmacy and Mathematics-Actuarial Science models, correct classifications were 89.8%, 73.6%, and 93.9%, respectively.

  6. Determination of the Effectiveness of Information Security and Audit Accounting IT Informational Program

    Directory of Open Access Journals (Sweden)

    Riana Iren RADU

    2014-11-01

    Full Text Available In the current society, there are many options regarding the use of computer programs for the processing of accounting information. In this paper I propose to develop the method of approach, in terms of technical IT audit, for a program for the management of accounting information, i.e. an integrated ERP-CRM program, used by the majority of Romanian business.

  7. Integrating the Full Range of Security Cooperation Programs into Air Force Planning: An Analytic Primer

    Science.gov (United States)

    2011-01-01

    Exchange Program ( IEP ) Authority 10 U.S.C. §2358, “Research and development projects” Processes and agreements IEP agreements with the...2015.4, “Defense Research, Development, Test and Evaluation (RDT&E) Information Exchange Program ( IEP )”; DoDD 5134.1, “Under Secretary of Defense for

  8. The implementation of nuclear security program and the improvement of physical protection in Indonesia: progress and challenges

    International Nuclear Information System (INIS)

    Khairul

    2009-01-01

    Full text: Non Proliferation of Nuclear Weapon Treaty (NPT), and the comprehensive safeguards agreements regime on IAEA model INFCIRC/153 Corr., nuclear safeguards systems have been operated for over three decades. Indonesia ratified the NPT agreement by Act No. 8 Year 1979. The government of the Republic of Indonesia is committed to general contribution in achieving a condition of safe, secure and peace the world in relation of nuclear energy utilization and to continue its strong support for the principles of the treaty. At that time Indonesian nuclear program was not as big as present programs. By time changes, the utilization of nuclear energy for peaceful purposes was significantly increasing based on the world's nuclear research and technology development. Nowadays, Indonesia has three research reactors and other nuclear installations for research activities. The first nuclear power plant is planned will operating on year 2016. National Nuclear Energy Agency (BATAN) as promoting body in Indonesia has several reactor research centers. They are located at different province such as Bandung nuclear research center, Yogyakarta nuclear research center and Serpong nuclear research center. As the research and development institution belongs to government BATAN has also develop research by using radioactive substances for peaceful purpose. At three reactor research center are used nuclear materials with different nuclear category. The biggest research reactor in Indonesia is located in national center for science and technology development or called PUSPIPTEK, Serpong district, Province of Banten. In Serpong nuclear research center comprise several nuclear installation such as research reactor G.A. Siwabessy (30 Mw thermal), fuel element production installation, experimental fuel element installation, radio metallurgy installation, radioisotopes installation, radioactive waste installation. The Serpong whole area is wide approximately 24 ha and including supporting

  9. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  10. Development of a program for calculation of second dose and securities in brachytherapy high dose rate

    International Nuclear Information System (INIS)

    Esteve Sanchez, S.; Martinez Albaladejo, M.; Garcia Fuentes, J. D.; Bejar Navarro, M. J.; Capuz Suarez, B.; Moris de Pablos, R.; Colmenares Fernandez, R.

    2015-01-01

    We assessed the reliability of the program with 80 patients in the usual points of prescription of each pathology. The average error of the calculation points is less than 0.3% in 95% of cases, finding the major differences in the axes of the applicators (maximum error -0.798%). The program has proved effective previously testing him with erroneous dosimetry. Thanks to the implementation of this program is achieved by the calculation of the dose and part of the process of quality assurance program in a few minutes, highlighting the case of HDR prostate due to having a limited time. Having separate data sheet allows each institution to its protocols modify parameters. (Author)

  11. Connected vehicle pilot deployment program phase 1, security management operational concept : ICF/Wyoming.

    Science.gov (United States)

    2016-03-14

    The Wyoming Department of Transportations (WYDOT) Connected Vehicle (CV) Pilot Deployment Program is intended to develop a suite of applications that utilize vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication technology to ...

  12. Connected vehicle pilot deployment program phase I : security management operational concept, Tampa Hillsborough Expressway Authority (THEA).

    Science.gov (United States)

    2016-05-01

    The Tampa Hillsborough Expressway Authority (THEA) Connected Vehicle (CV) Pilot Deployment Program is intended to develop a suite of applications that utilize vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication technology to re...

  13. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  14. Diabetes risk reduction in overweight first degree relatives of type 2 diabetes patients: Effects of a low-intensive lifestyle education program (DiAlert) A randomized controlled trial

    NARCIS (Netherlands)

    Heideman, W.H.; de Wit, M.; Middelkoop, B.J.C.; Nierkens, V.; Stronks, K.; Verhoeff, A.P.; Snoek, F.J.

    2015-01-01

    Objectives: To test the efficacy of a low-intensive lifestyle education program (DiAlert) for overweight first degree relatives of type 2 diabetes patients aimed at reducing diabetes risk. Methods: Overweight first degree relatives of type 2 diabetes patients were randomly assigned to the DiAlert

  15. Diabetes risk reduction in overweight first degree relatives of type 2 diabetes patients: Effects of a low-intensive lifestyle education program (DiAlert) A randomized controlled trial

    NARCIS (Netherlands)

    Heideman, W.H.; de Wit, M.; Middelkoop, B.J.C.; Nierkens, V.; Stronks, K.; Verhoeff, A.P.; Snoek, F.J.

    2015-01-01

    Objectives To test the efficacy of a low-intensive lifestyle education program (DiAlert) for overweight first degree relatives of type 2 diabetes patients aimed at reducing diabetes risk. Methods Overweight first degree relatives of type 2 diabetes patients were randomly assigned to the DiAlert

  16. Diabetes risk reduction in overweight first degree relatives of type 2 diabetes patients: effects of a low-intensive lifestyle education program (DiAlert) A randomized controlled trial

    NARCIS (Netherlands)

    Heideman, Wieke H.; de Wit, Maartje; Middelkoop, Barend J. C.; Nierkens, Vera; Stronks, Karien; Verhoeff, Arnoud P.; Snoek, Frank J.

    2015-01-01

    To test the efficacy of a low-intensive lifestyle education program (DiAlert) for overweight first degree relatives of type 2 diabetes patients aimed at reducing diabetes risk. Overweight first degree relatives of type 2 diabetes patients were randomly assigned to the DiAlert intervention (N=45) or

  17. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  18. Funding Homeland Security Programs at the State Level: A Multiple Policy Analysis

    Science.gov (United States)

    2014-12-01

    OPTIONS .....................................................................55 A. FRANCHISE FEE...that another payment for services program based on utilities usage, the franchise fee, was an illegal tax as it was applied. This action resulted in...and largest consumer of anhydrous ammonia. Sectors tied to national interest include: (1) food and agricultural with both production and animal disease

  19. 75 FR 4911 - Food Stamp Program: Eligibility and Certification Provisions of the Farm Security and Rural...

    Science.gov (United States)

    2010-01-29

    ... the State's Temporary Assistance for Needy Families (TANF) cash assistance or Medicaid programs... is adjusted annually for cost-of-living increases; allow States to simplify the Standard Utility Allowance (SUA) if the State elects to use the SUA rather than actual utility costs for all households...

  20. Stacking The Deck - Can We Better Develop Future Homeland Security Leaders With Formal Mentoring Programs?

    Science.gov (United States)

    2014-09-01

    integrity, trustworthy , strong work ethic, critical thinker, etc.), and a willing program participant with high expectations.73 Desired...interpersonal skills  Trustworthy , honest, and flexible  “A forward, global thinker who is available and has the Department’s and the mentee’s best...Employees . Mentoring Employees . Celebrating Accomplishments Explain the importance of good communication skills . Communications iviodei

  1. Cyber Forensics and Security as an ABET-CAC Accreditable Program

    Science.gov (United States)

    Wood, David F.; Kohun, Frederick G.; Ali, Azad; Paullet, Karen; Davis, Gary A.

    2010-01-01

    This paper frames the recent ABET accreditation model with respect to the balance between IS programs and innovation. With the current relaxation of the content of the information systems requirement by ABET, it is possible to include innovation into the accreditation umbrella. To this extent this paper provides a curricular model that provides…

  2. Designing time-of-use program based on stochastic security constrained unit commitment considering reliability index

    International Nuclear Information System (INIS)

    Nikzad, Mehdi; Mozafari, Babak; Bashirvand, Mahdi; Solaymani, Soodabeh; Ranjbar, Ali Mohamad

    2012-01-01

    Recently in electricity markets, a massive focus has been made on setting up opportunities for participating demand side. Such opportunities, also known as demand response (DR) options, are triggered by either a grid reliability problem or high electricity prices. Two important challenges that market operators are facing are appropriate designing and reasonable pricing of DR options. In this paper, time-of-use program (TOU) as a prevalent time-varying program is modeled linearly based on own and cross elasticity definition. In order to decide on TOU rates, a stochastic model is proposed in which the optimum TOU rates are determined based on grid reliability index set by the operator. Expected Load Not Supplied (ELNS) is used to evaluate reliability of the power system in each hour. The proposed stochastic model is formulated as a two-stage stochastic mixed-integer linear programming (SMILP) problem and solved using CPLEX solver. The validity of the method is tested over the IEEE 24-bus test system. In this regard, the impact of the proposed pricing method on system load profile; operational costs and required capacity of up- and down-spinning reserve as well as improvement of load factor is demonstrated. Also the sensitivity of the results to elasticity coefficients is investigated. -- Highlights: ► Time-of-use demand response program is linearly modeled. ► A stochastic model is proposed to determine the optimum TOU rates based on ELNS index set by the operator. ► The model is formulated as a short-term two-stage stochastic mixed-integer linear programming problem.

  3. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  4. Nuclear proliferation and Latin American security : is the "Bomb" program dead in Brazil?

    OpenAIRE

    DeJesus, Eduardo De Jesus

    1994-01-01

    This thesis addresses the possibility of a Brazilian "hidden agenda" in order to support one of the most advanced nuclear research and nuclear power programs in Latin America. From the early 1970s to the late 1980s Brazilian military leaders pursued the development of nuclear weapons. With the emergence of democratic regimes during the 1980s, these covert projects were halted or terminated. The civilian administration in Brazil is now supporting an ambiguous and uncompromising position by ...

  5. NCRP Program Area Committee 3: Nuclear and Radiological Security and Safety.

    Science.gov (United States)

    Taylor, Tammy P; Buddemeier, Brooke

    2016-02-01

    Program Area Committee (PAC) 3 provides guidance and recommendations for response to nuclear and radiological incidents of both an accidental and deliberate nature. Leadership of PAC 3 was transitioned in March 2015, and the newly composed PAC has been working to delineate and then prioritize the landscape of possible activities for PAC 3. The major activity of PAC 3 during the past year was the establishment of Scientific Committee 3-1 to begin producing a report on Guidance for Emergency Responder Dosimetry.

  6. The National Guard State Partnership Program and Regional Security in the Western Balkans

    Science.gov (United States)

    2014-12-12

    educational system as well as youth movements are separated by ethnicity, which in turn leaves the young people susceptible to indoctrination and political...of the state to respond in natural emergencies.80 A testament of the effectiveness of the program is also its expansion from strictly mil-mil... testament of the friendship, we have deployed together to Afghanistan and continue to look for future military collaborations. Deployments are the

  7. The use of Photovoice to document and characterize the food security of users of community food programs in Iqaluit, Nunavut.

    Science.gov (United States)

    Lardeau, M-P; Healey, G; Ford, J

    2011-01-01

    Food insecurity is a chronic problem affecting Inuit communities. The most comprehensive assessment of Inuit food security to-date, the Inuit Health Survey, reported that 70% of Inuit pre-school children lived in 'food insecure' households. Food banks and soup kitchens are relatively new in the Arctic but the number of users is increasing. Little is known about the experience and determinants of food insecurity among food program users who are often among the most marginalized (socially and economically) in communities. The use of participatory research methods when working in the north of Canada can promote meaningful knowledge exchange with community members and this approach was used in the present 'Photovoice' research. Photovoice uses photography to develop a baseline understanding of an issue, in this case the experience and determinants of food insecurity among users of community food programs in Iqaluit, Nunavut. The target population includes those who face significant social and economic marginalization, an often neglected group in Arctic food systems research. Eight regular users of food programs were recruited and engaged in a Photovoice research project to document factors determining their daily food consumption. The research method was introduced in workshops and discussion included the ethical concerns related to photography and how to take pictures. Participants were supplied with digital cameras, and asked to answer the following question using photography: 'What aspects of your everyday life affect what you eat and how much you have to eat?'. In the final workshop, photographs were discussed among the group and participants identified key themes in the photographs, offering an understanding of food insecurity from their perspectives. The group then discussed what should be done with the knowledge gained. Factors improving food security were the customary systems for sharing 'country food', and the presence of social support networks in the

  8. THE ROLE OF THE "GEOSPACE” FORMATION PROGRAM IN DEVELOPING GEOGRAPHY TEACHERS’ COMPETENCE, IN RAISING THE DEGREE OF LESSON ATTRACTIVENESS AND IN IMPROVING STUDENTS’ RESULTS

    Directory of Open Access Journals (Sweden)

    IULIU VESCAN

    2013-01-01

    Full Text Available This paper starts from the analysis of needs of specialty training for Geography teachers when confronted with the scientific evolution of the field and considering the challenges imposed by an ever changing educational system. Within this framework, the Faculty of Geography at “Babeş-Bolyai” University, Cluj-Napoca, Romania, as a supplier of teacher training courses, organized a training course in the field of Geomatics. We analyzed the necessity and usefulness of this type of training course considering the number of teachers interested in this training course and an evaluation form of the course. Additionally, we evaluated the way in which the competences obtained during the formation program in Geomatics were put into practice on two separate components: an increase in the degree of attractiveness in Geography lessons and the improvement of students’ school performance. The efficiency of the training program was evaluated by comparing the knowledge taught during a reference lesson in which the teaching was carried out in two different ways. The following step was to apply a unique test to two different student groups with a similar level of knowledge, which revealed that the best results belonged to the students in the group in which the methods and techniques used to deliver the teaching were the ones acquired during the training course. By validating the initial hypothesis, we reached the conclusion that it was necessary to introduce these GIS-TIC contents in the educational context for preuniversity education.

  9. Minorities Striving and Pursuing Higher Degrees of Success in Earth System Science (MS PHD'S) Beyond the PhD Professional Development Program: A Pilot Project

    Science.gov (United States)

    Johnson, A.; Jearld, A.; Williamson Whitney, V.; Huggans, M.; Ricciardi, L.; Thomas, S. H.; Jansma, P. E.

    2012-12-01

    In 2011 the Minorities Striving and Pursuing Higher Degrees of Success in Earth System Science (MS PHD'S)® initiative launched its newest activity entitled the MS PHD'S "Beyond the PhD (B-PhD) Professional Development Program." This exciting new program was designed to facilitate the development of a new community of underrepresented minority (URM) doctoral candidates and recent doctorate degree recipients in Earth system science (ESS)-related fields. The MS PHD'S B-PhD provides customized support and advocacy for MS PHD'S B-PhD participants in order to facilitate smoother and informed transitions from graduate school, to postdoctoral and tenure-track positions, as well as other "first" jobs in government, industry, and non-profit organizations. In November 2011 the first cohort of MS PHD'S B-PhD participants engaged in intensive sessions on the following topics: "Toolkits for Success for Academia, Business/Industry, Federal Government and Non-Profits", "Defining Short, Mid and Long Term Career Goals", "Accessing and Refining Skill Sets and Other Door Openers", "International Preparation and Opportunities", "Paying it Forward/Lifting as You Climb", and "Customized Strategies for Next Steps". This pilot event, which was hosted by the University of Texas at Arlington's (UTA) College of Science, also provided opportunities for participants to serve as guest lecturers in the UTA's Colleges of Science and Engineering and included one-on-one discussions with MS PHD'S B-PhD mentors and guest speakers who are well established within their individual ESS fields. Insights regarding opportunities, challenges and obstacles commonly faced by URMs within the ESS fields, as well as strategies for success were shared by MS PHD'S B-PhD mentors and guest speakers. Survey results indicate that MS PHD'S B-PhD participants appreciated not only the material covered during this pilot activity, but also appreciated the opportunity to become part of a community of young URM ESS

  10. (Congressional Interest) Institute for Science, Space and Security (ISSS)

    Science.gov (United States)

    2012-03-19

    Studies program between UCCS and University of Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb ...security and assist the University of Zagreb in establishing a regional (Eastern Europe) Center of Excellence in Homeland Security. In the long-term...UCCS will assist the University of Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees

  11. Paddy farmer households’ participation and food security level in special effort program in Seputih Raman sub-district of Central Lampung Regency

    Science.gov (United States)

    Rangga, K. K.; Syarief, Y. A.

    2018-03-01

    The objectives of this study are to study the participation of paddy farmers in the Special Effort program to increase paddy production, to study the level of household food security of paddy farmers, and to analyze the correlation between farmer participation and food security level of paddy farmers. The location was chosen purposively in Seputih Raman sub-district. The data were collected from December 2016 to February 2017. The population of this study was paddy farmers who participating in Special Effort program. The hypothesis was tested by using Spearman’s Rank correlation test. Farmer household’s food security was measured objectively based on the share of household’s food expenditure and subjectively based on the opinion, views, and attitudes or farmers’ opinions on food availability, food distribution, and household food consumption. This research showed that farmers’ participation in Special Effort program in Seputih Raman Sub Ditrict, Central Lampung Regency belonged to medium classification, household food security either objectively or subjectively was in food resistant condition of medium classification, and there was significant correlation between farmers’ participation and food security level of paddy farmer household.

  12. Forecasting of the radioactive material transport demand for the Brazilian Nuclear Program and the security aspects

    International Nuclear Information System (INIS)

    Meldonian, Nelson Leon

    1979-01-01

    In the nuclear fuel cycle, a lot of radioactive materials are produced. These radioactive materials must be transported in order to promote the integration of the fuel cycle units. Considerations about the transport characteristics of radioactive material were made for each section of the fuel cycle. These considerations were based on the experience of several countries and in accordance with the International Atomic Energy Agency regulations. A prediction of transport demands for the Brazilian Nuclear Program until year 2.010 was made. The prediction refers mainly to the quantity of radioactive material produced in each section of the cycle the quantity of vehicles needed for the transport of these materials. Several safety aspects were considered specially, the accidents predictions for years 2.000 and 2.010. The accident probability in Brazilian railroads and highways was compared with that of the USA. (author)

  13. SNAP-Ed (Supplemental Nutrition Assistance Program-Education) Increases Long-Term Food Security among Indiana Households with Children in a Randomized Controlled Study.

    Science.gov (United States)

    Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A

    2016-11-01

    Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.

  14. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  15. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  16. Execution of a participatory supportive return to work program within the Dutch social security sector: a qualitative evaluation of stakeholders' perceptions.

    Science.gov (United States)

    Lammerts, Lieke; Schaafsma, Frederieke G; van Mechelen, Willem; Anema, Johannes R

    2016-04-14

    A process evaluation of a participatory supportive return to work program, aimed at workers without a (permanent) employment contract who are sick-listed due to a common mental disorder, revealed that this program was executed less successfully than similar programs evaluated in earlier studies. The program consisted of a participatory approach, integrated care and direct placement in competitive employment. Aim of this study was to get a better understanding of the execution of the program by evaluating stakeholders' perceptions. In the absence of an employer, the program was applied by the Dutch Social Security Agency, in collaboration with vocational rehabilitation agencies. Together with the sick-listed workers, these were the main stakeholders. Our research questions involved stakeholders' perceptions of the function(s) of the program, and their perceptions of barriers and facilitators for a successful execution of the program within the Dutch social security sector. Semi-structured interviews were held with five sick-listed workers, eight professionals of the Social Security Agency, and two case managers of vocational rehabilitation agencies. Interview topics were related to experiences with different components of the program. Selection of respondents was based on purposive sampling and continued until data saturation was reached. Content analysis was applied to identify patterns in the data. Two researchers developed a coding system, based on predefined topics and themes emerging from the data. Although perceived functions of some components of the program were as intended, all stakeholders stressed that the program often had not resulted in return to work. Perceived barriers for a successful execution were related to a poor collaboration between the Dutch Social Security Agency, vocational rehabilitation agencies and healthcare providers, the type of experienced (health) problems, time constraints, and limited job opportunities. For future implementation

  17. Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses

    OpenAIRE

    Raina , Sagar; Taylor , Blair; Kaza , Siddharth

    2015-01-01

    Part 2: Software Security Education; International audience; Learning interventions based on modules are common in computer science education. Traditional learning modules that present a large amount of content in a linear format can lead to students skimming and skipping content resulting in lower student engagement and effectiveness. In this paper, we present theoretical support for increasing engagement and effectiveness of learning modules, describe a system that implements these principl...

  18. Nuclear Safeguards and Security Education at Russian Universities

    International Nuclear Information System (INIS)

    Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2008-01-01

    The U.S. Department of Energy is assisting key Russian universities in developing safeguards and security degree programs to prepare the next generation of specialists who will be responsible for protecting nuclear material from illicit use. These programs include course and laboratory work in nuclear material measurements, vulnerability analysis, exterior and interior sensors, and legal aspects of nuclear nonproliferation. Moscow Engineering Physics Institute (MEPhI) has graduated nine classes of masters students, most of who are working in government agencies, research organizations, or pursuing their PhD. With DOE support, MEPhI has also established a 5 1/2-year engineering degree program in safeguards and security. This is a hands-on degree that more closely meets the needs of nuclear facilities. The first class graduated in February 2007, marking a major milestone in Russian nonproliferation education. A second engineering degree program has been established at Tomsk Polytechnic University and is designed to reach those students east of the Ural Mountains, where many nuclear facilities are located. The first class will graduate in February 2009. This paper describes current development of these education programs, new initiatives, and sustainability efforts to ensure their continued viability after DOE support ends. The paper also describes general nonproliferation education activities supported by DOE that complement the more technical safeguards and security education programs.

  19. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  20. Food for Work Program and its Implications on Food Security: A Critical Review with a Practical Example from the Amhara Region, Ethiopia

    Directory of Open Access Journals (Sweden)

    Ashenafi Gedamu

    2006-10-01

    Full Text Available A systematic evaluation of food-for-work (FFW programs in Ethiopia is seriously lacking. Most of the few available reports indicate that these programs have reached very few achievements in terms of food security and reduction of poverty at large. As expressed by Holden et al. (2005, FFW programs are commonly aimed to produce or maintain potentially valuable public goods necessary to stimulate productivity and thus income growth. Natural resources management, like rural road construction, erosion control and afforestation of degraded lands can be mentioned as valuable measures which could stimulate productivity and agricultural growth. The poverty reduction and food security impact of food or cash for work activities are larger if they offer not only seasonal job opportunities to the rural community but also long term employment possibilities. This is more likely if the projects are regionally dispersed and combined with basic education. In the Ethiopian context, it was always questionable if the continuous boom in food aid (regardless of cash or food for work purposes was the solution for the long standing food insecurity and poverty crises in the country. The study discusses the efficiency of FFW programs that aimed to reduce rural poverty and ensure food security on the one hand, and the impact of the food aid on resource and time allocation of the participating households for own food production on the other. The study is based on a field research conducted at a FFW program project, in the Amhara region, Ethiopia run by the German Agency for Technical Cooperation (GTZ with the view of improving food security in the Amhara region, Ethiopia. A household theoretical model is used to analyze the sample data, whether FFW program may indeed reduce household food insecurity and/or has some crowding-out effects on labour allocation of participating households for own field production.

  1. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union.

    Science.gov (United States)

    Bartholomew, James C; Pearson, Andrew D; Stenseth, Nils Chr; LeDuc, James W; Hirschberg, David L; Colwell, Rita R

    2015-01-01

    Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world, largely because of economic struggles, scientific capacity has not kept pace with the need to accomplish this goal and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to educate the next generations of young investigators in the region. These efforts need to be coupled with the understanding and resolve of local governments and international agencies to promote an aggressive science agenda. International collaborative scientific investigation of infectious diseases not only adds significantly to scientific knowledge, but it promotes health security, international trust, and long-term economic benefit to the region involved. This premise is based on the observation that the most powerful human inspiration is that which brings peoples together to work on and solve important global challenges. The republics of the former Soviet Union provide a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world's great epidemics began. The scientific infrastructure and disease surveillance capabilities of the region suffered significant decline after the breakup of the Soviet Union. The U.S. Cooperative Threat Reduction (CTR) Program, a part of the U.S. Department of Defense, together with partner countries, have worked diligently to

  2. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  3. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Science.gov (United States)

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  4. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  5. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  6. Four-Year Degree and Employment Findings from a Randomized Controlled Trial of a One-Year Performance-Based Scholarship Program in Ohio

    Science.gov (United States)

    Mayer, Alexander K.; Patel, Reshma; Gutierrez, Melvin

    2016-01-01

    A college degree is often viewed as a key step toward better employment and higher earnings. Many community college students, however, never graduate and cannot reap the financial benefits associated with a college degree. Although existing research suggests that financial aid interventions can modestly improve students' short-term academic…

  7. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  8. Astronautics Degrees for Space Industry

    Science.gov (United States)

    Gruntman, M.; Brodsky, R.; Erwin, D.; Kunc, J.

    The Astronautics Program (http://astronautics.usc.edu) of the University of Southern California (USC) offers a full set of undergraduate and graduate degree programs in Aerospace Engineering with emphasis in Astronautics. The Bachelor of Science degree program in Astronautics combines basic science and engineering classes with specialized astronautics classes. The Master of Science degree program in Astronautics offers classes in various areas of space technology. The Certificate in Astronautics targets practicing engineers and scientists who enter space-related fields and/or who want to obtain training in specific space-related areas. Many specialized graduate classes are taught by adjunct faculty working at the leading space companies. The Master of Science degree and Certificate are available through the USC Distance Education Network (DEN). Today, the Internet allows us to reach students anywhere in the world through webcasting. The majority of our graduate students, as well as those pursuing the Certificate, work full time as engineers in the space industry and government research and development centers. The new world of distance learning presents new challenges and opens new opportunities. We show how the transformation of distance learning and particularly the introduction of webcasting transform organization of the program and class delivery. We will describe in detail the academic focus of the program, student reach, and structure of program components. Program development is illustrated by the student enrollment dynamics and related industrial trends; the lessons learned emphasize the importance of feedback from the students and from the space industry.

  9. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  10. Nigeria; Publication of Financial Sector Assessment Program Documentation––Detailed Assessment of Implementation of IOSCO Objectives and Principles of Securities Regulation

    OpenAIRE

    International Monetary Fund

    2013-01-01

    An assessment of the level of implementation of the International Organization of Securities Commissions (IOSCO) Principles in Nigeria was conducted as part of the International Monetary Fund (IMF)-World Bank Financial Sector Assessment Program (FSAP). The ongoing global financial crisis has reinforced the need for assessors to make a judgment about supervisory practices and to determine whether they are sufficiently effective. The assessment methodology provides a set of assessment criteria ...

  11. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  12. Security personnel training using a computer-based game

    International Nuclear Information System (INIS)

    Ralph, J.; Bickner, L.

    1987-01-01

    Security personnel training is an integral part of a total physical security program, and is essential in enabling security personnel to perform their function effectively. Several training tools are currently available for use by security supervisors, including: textbook study, classroom instruction, and live simulations. However, due to shortcomings inherent in each of these tools, a need exists for the development of low-cost alternative training methods. This paper discusses one such alternative: a computer-based, game-type security training system. This system would be based on a personal computer with high-resolution graphics. Key features of this system include: a high degree of realism; flexibility in use and maintenance; high trainee motivation; and low cost

  13. Coping and Its Relation to Retention among Male Minority Nursing Students in an Associate Degree Nursing Program in a South Texas Community College: An Explanatory Sequential Mixed Methods Inquiry

    Science.gov (United States)

    Diggs, Gwendolyn Smith

    2013-01-01

    In Texas, there is an increase in the enrollment of men of various ethnicities in nursing schools, especially Associate Degree Nursing (ADN) programs. As these men strive to complete the nursing education, they face many concerns that center on barriers that are encountered in what is still a predominately Caucasian and female environment. In…

  14. Barriers and Potential Improvements for Needle and Syringe Exchange Programs (NSPs in China: A Qualitative Study from Perspectives of Both Health and Public Security Sectors.

    Directory of Open Access Journals (Sweden)

    Fung Kuen Koo

    Full Text Available This study explores the acceptability, the barriers to the implementation of needle and syringe exchange programs (NSPs and the potential improvement strategies in China from the perspectives of governmental health and public security officials. Purposive sampling was used for recruitment of participants who had been involved in NSPs implementation. Semi-Structured individual interviews were conducted in Mandarin to address three aspects of NSPs: (1 participants' attitudes towards NSPs, (2 participants' opinions on the effectiveness and barriers of NSPs, and (3 suggestions for improving the program. Content analysis was used to analyse the translated interview data. A total of 68 participants from 12 Hunan counties were interviewed (34 from each of the Bureau of Health and the Narcotic Division. Both groups recognised the importance and effectiveness of NSPs in HIV prevention, but public security officials regarded NSPs as a temporary intervention in place of punitive measures. Most health officials (32/34 regarded the main barriers to its implementation as administrative and structural, whereas participants from Narcotics Division (n=24 questioned the legitimacy of NSPs and concerned about the poor management of drug users' risk behaviours. Close cooperation between the health and public security sectors, engagement of the drug user community and an enabling policy environment were reportedly to be critical for potential improvements of NSPs in China. Misconceptions about NSPs encourage drug users' addictive behaviour, and an unclear leadership and insufficient support de-motivate the participants from the Bureau of Health and the Narcotics Division to actively support the program implementation.

  15. What can Iran gain by having a nuclear weapons program that threatens to destabilize security in the Middle East?

    DEFF Research Database (Denmark)

    Nielsen, Thomas Galasz

    and a lot of neigh- bouring countries fear such a development for security reasons. But why is Iran following a nuclear path that may further destabilise the fragile security situation in the Middle East? It is to do with Iran’s own perception of security risks, its desire for greatness in the region......- bination with its important strategic location by the Strait of Hormuz, and supports various political groupings in and around Syria and Iraq to attract the attention of the United States of American in an attempt to become recognised as the most important player in the Middle East. Should Iran succeed...... in its brinkmanship and the outcome could be the lifting of the UN sanctions, international recognition, improved security, and even a possible end to internal political power struggles due to likely economic reforms post-sanctions. Much is at stake for Iran, but, if it succeeds, it could shift...

  16. The Impact of a Home-Delivered Meal Program on Nutritional Risk, Dietary Intake, Food Security, Loneliness, and Social Well-Being.

    Science.gov (United States)

    Wright, Lauri; Vance, Lauren; Sudduth, Christina; Epps, James B

    2015-01-01

    Maintaining independence and continuing to live at home is one solution to manage the rising health care costs of aging populations in the United States; furthermore, seniors are at risk of malnutrition and food insecurity. Home-delivered meal programs are a tool to address food, nutrition, and well-being concerns of this population. Few studies have identified outcomes from these programs; this pilot study reviews the nutritional status, dietary intake, well-being, loneliness, and food security levels of seniors participating in a Meals on Wheels delivery service. Clients, new to the meal program, participated in pre- and postphone interviews, and 51 seniors completed the study. The survey was composed of five scales or questionnaires, and statistical analyses were conducted using SPSS. Improvements across all five measures were statistically significant after participating two months in the home-delivered meal program. Implications for further research, practice, and the Older Americans Act are discussed.

  17. Security Data Warehouse Application

    Science.gov (United States)

    Vernon, Lynn R.; Hennan, Robert; Ortiz, Chris; Gonzalez, Steve; Roane, John

    2012-01-01

    The Security Data Warehouse (SDW) is used to aggregate and correlate all JSC IT security data. This includes IT asset inventory such as operating systems and patch levels, users, user logins, remote access dial-in and VPN, and vulnerability tracking and reporting. The correlation of this data allows for an integrated understanding of current security issues and systems by providing this data in a format that associates it to an individual host. The cornerstone of the SDW is its unique host-mapping algorithm that has undergone extensive field tests, and provides a high degree of accuracy. The algorithm comprises two parts. The first part employs fuzzy logic to derive a best-guess host assignment using incomplete sensor data. The second part is logic to identify and correct errors in the database, based on subsequent, more complete data. Host records are automatically split or merged, as appropriate. The process had to be refined and thoroughly tested before the SDW deployment was feasible. Complexity was increased by adding the dimension of time. The SDW correlates all data with its relationship to time. This lends support to forensic investigations, audits, and overall situational awareness. Another important feature of the SDW architecture is that all of the underlying complexities of the data model and host-mapping algorithm are encapsulated in an easy-to-use and understandable Perl language Application Programming Interface (API). This allows the SDW to be quickly augmented with additional sensors using minimal coding and testing. It also supports rapid generation of ad hoc reports and integration with other information systems.

  18. New directions for African security

    NARCIS (Netherlands)

    Haastrup, Toni; Dijkstra, Hylke

    2017-01-01

    African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the

  19. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  20. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...