The Southwest Surety Institute was formed in June 1996 by Arizona State University (ASU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL) to provide educational programs in Security Engineering, and to conduct research and development in security technologies. This is the first science-based program of its kind in the US, focused on educating Security Engineers to help government and industry address their security needs. Each member brings a unique educational capability to the Institute. NM Tech has a formidable explosives testing and evaluation facility. ASU is developing a Masters program in Security Engineering at their School of Technology located on a new campus in Mesa, Arizona. NMSU provides a Security Technology minor, merging programs in Criminal Justice and Engineering Technology. The Sandia National Laboratories security system design and evaluation process forms the basis for the Security Engineering curricula. In an effort to leverage the special capabilities of each university, distance education will be used to share courses among Institute members and eventually with other sites across the country.
The Southwest Surety Institute was formed in 1996 to create unique, science-based educational programs in security engineering. The programs will integrate business, technology, and criminal justice elements to educate a new generation of security professionals. Graduates of the programs will better understand basic security system design and evaluation and contribute to strengthening of the body of knowledge in the area of security. A systematic approach incorporating people, procedures, and equipment will be taught that will emphasize basic security principles and establish the science of security engineering. The use of performance measures in the analysis of designed systems will enable effective decisions by an enterprise and provide the rationale for investment in security systems. Along with educational programs, Institute members will conduct original research and development built on existing relationships with sponsors from government and industry in areas such as counterterroism, microelectronics, banking, aviation, and sensor development. Additional information and updates on the Southwest Surety Institute are available via the Institute home page at www.emrtc.nmt.edu/ssi.
Trabelsi, Zouheir; McCoey, Margaret
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…
With the realization that nuclear energy had a vast potential for peacetime development, universities throughout the country began to develop courses in nuclear energy. A pioneering educational effort was necessary because there was an inadequate number of trained faculty, no established curricula, no textbooks, and very little suitable equipment. Nevertheless, by the early 1950's, several programs in nuclear science and engineering were beginning to provide instruction to potential nuclear engineers. At that time, the American Society for Engineering Education (ASEE) established a nuclear committee to cooperate with the U. S. Atomic Energy Commission (AEC) in nuclear education matters. With the financial support of the AEC, textbook material was developed, faculty training programs were instituted, and funds were made available for equipment. Because of the large interest shown in the field, many colleges and universities began to develop nuclear engineering curricula. After a few years, the need arose for general guidelines in curricular development. This led to the development of a Committee on Objective Criteria in Nuclear Engineering Education in which ASEE and the American Nuclear Society cooperated with the support of AEC. The committee report emphasized basic science, nuclear energy concepts, and nuclear technology, which have continued to be the significant components of a nuclear engineering curriculum. The last ten years have brought increased emphasis on BS programs, the introduction of extensive computer-based instruction, and an increasing emphasis on the engineering aspects of nuclear reactor power systems
Garip, Mehmet; Erdil, Erzat; Bilsel, Ayhan
A survey on the attitudes of engineering faculty to chemistry, physics, and mathematics was conducted with the aim of clarifying the attitudes of engineering faculty to chemistry courses in relation to engineering education or curricula and assessing their expectations. The results confirm that on the whole chemistry is perceived as having a…
Glisson, W.; Welland, R.; Glisson, L.M.
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security shou...
Talty, John T.
National Institute for Occupational Safety and Health instituted a project in 1980 to encourage engineering educators to focus on occupational safety and health issues in engineering curricula. Progress to date is outlined, considering specific results in curriculum development, engineering society interaction, and formation of a teaching…
For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system
Mueller, Megan Kiely; Byrnes, Elizabeth M.; Buczek, Danielle; Linder, Deborah E.; Freeman, Lisa M.; Webster, Cynthia R. L.
One of the persistent challenges in science, technology, engineering, and math (STEM) education is increasing interest, learning, and retention, particularly with regard to girls and students in underserved areas. Educational curricula that promote process and content knowledge development as well as interest and engagement in STEM are critical in…
Glavic, Peter; Lukman, Rebeka; Lozano, Rodrigo
Over recent years, universities have been incorporating sustainable development (SD) into their systems, including their curricula. This article analyses the incorporation of SD into the curricula of chemical and environmental engineering or technology bachelor degrees at universities in the European Union (EU) and European Free Trade Association…
Elleman, T.S.; Gilligan, J.G.
The strong national emphasis on waste and environmental issues has prompted increasing interest among nuclear engineering students in study options that will prepare them for careers in these areas. Student interest appears to focus principally on health physics, radioactive waste disposal, and environmental interactions with radionuclides. One motivation for this interest appears to be the growing national programs in environmental restoration and waste remediation that have produced fellowship support for nuclear engineering students as well as employment opportunities. Also, the recent National Academy of sciences study on nuclear engineering education specifically emphasized the importance of expanding nuclear engineering curricula and research programs to include a greater emphasis on radioactive waste and environmental issues. The North Carolina State University (NCSU) Department of Nuclear Engineering is attempting to respond to these needs through the development of course options that will allow students to acquire background in environmental subjects as a complement to the traditional nuclear engineering education
Maintaining nuclear competencies in the nuclear industry is a one of the most critical challenges in the near future. With the development of a number of nuclear engineering educational programmes in several States, this publication provides guidance to decision makers in Member States on a competence based approach to curricula development, presenting the established practices and associated requirements for educational programmes in this field. It is a consolidation of best practices that will ensure sustainable, effective nuclear engineering programmes, contributing to the safe, efficient and economic operation of nuclear power plants. The information presented is drawn from a variety of recognized nuclear engineering programmes around the world and contributes to the main areas that are needed to ensure a viable and robust nuclear industry
Caporali, Enrica; Catelani, Marcantonio; Manfrida, Giampaolo; Valdiserri, Juna
Environmental engineers are technicians with specific expertise on the sustainability of human presence in the environment. Among other global dilemmas, to the environmental engineers it is often demanded to be able in developing systematic, innovative solutions in order to simultaneously meet water and energy needs, to build resilience to natural and technological disasters, to more accurately gauge and manage countries' greenhouse gas emissions. The general objectives of the Environmental Engineers are to establish actions of environmental sustainability as well as to verify progress toward global goals or international commitments. The globalization of challenges and problems to be faced, leads, in general, to the globalization of the engineering profession. In particular, since the environmental issues are without boundaries, and many and different are the involved professions and the competences, the environmental engineer must have a multidisciplinary and interdisciplinary approach to adequately answer to the demand of technical innovative knowledge at global scale. The environmental engineers, more and more, are involved in international projects were the effective collaboration requires not only the capacity to communicate in a common technical language, but also the assurance of an adequate and common level of technical competences, knowledge and understanding. The Europe-based EUR ACE system, currently operated by ENAEE - European Network for Accreditation of Engineering Education, can represent the proper framework and accreditation system in order to provide a set of measures to assess the quality of engineering degree programmes in Europe and abroad. In the global frame of the knowledge triangle: education-innovation-research, the accreditation and quality assurance of engineering curricula in Europe is discussed with reference to the Environmental engineering curricula, of the 1st and 2nd cycle, based on the European Credit Transfer System and in
The purpose of this paper is to identify the expected impact of artificial intelligence (AI) on curricula and training courses. From this examination, new elements are proposed for the academic preparation and training of engineers who will evaluate and use these systems and capabilities. Artificial intelligence, from an operational viewpoint, begins with a set of rules governing the operation of logic, implemented via computer software and userware. These systems apply logic and experience to handling problems in an intelligent approach, especially when the number of alternatives to problem solution is beyond the scope of the human user. Usually, AI applications take the form of expert systems. An expert system embodies in the computer the knowledge-based component of an expert, such as domain knowledge and reasoning techniques, in such a form that the system can offer intelligent advice and, on demand, justify its own line of reasoning. Two languages predominate, LISP and Prolog. The AI user may interface with the knowledge base via one of these languages or by means of menu displays, cursor selections, or other conventional user interface methods
environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security
Giorgini, P.; Massacci, F.; Zannone, N.; Aldini, A.; Gorrieri, R.; Martinelli, F.
Integrating security concerns throughout the whole software development process is one of today’s challenges in software and requirements engineering research. A challenge that so far has proved difficult to meet. The major difficulty is that providing security does not only require to solve
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)
Steele, Basil J.
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Gallego-Schmid, Alejandro; Schmidt Rivera, Ximena C.; Stamford, Laurence
Purpose: The implementation of life cycle assessment (LCA) and carbon footprinting represents an important professional and research opportunity for chemical engineers, but this is not broadly reflected in chemical engineering curricula worldwide. This paper aims to present the implementation of a coursework that is easy to apply, free of cost,…
Zhan, Wei; Goulart, Ana; Morgan, Joseph A.; Porter, Jay R.
This paper discusses the details of the curricular development effort with a focus on the vertical and horizontal integration of laboratory curricula and course projects within the Electronic Engineering Technology (EET) program at Texas A&M University. Both software and hardware aspects are addressed. A common set of software tools are…
Rashid, Muhammad; Tasadduq, Imran A.
The exponential growth of advancing technologies is pushing curriculum designers in computer engineering (CpE) education to compress more and more content into the typical 4-year program, without necessarily paying much attention to the cohesiveness of those contents. The result has been highly fragmented curricula consisting of various…
Navarro, Maria; Foutz, Timothy; Thompson, Sidney; Singer, Kerri Patrick
The purpose of this study was to develop a model to help engineering faculty overcome the challenges they face when asked to design and implement interdisciplinary curricula. Researchers at a U.S. University worked with an Interdisciplinary Consultant Team and prepared a steering document with Guiding Principles and Essential Elements for the…
A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.
Naif A. Darwish
Full Text Available In academia, smooth progression of students significantly depends on the way curricula are developed and organized. Curricula or study plans with high degree of interconnectivity between courses, multiple prerequisites, and hierarchically structured courses tend to complicate the smooth progress of the enrolled students. In this work, a rigorous quantitative relaxation indicator, developed and published elsewhere by the first author, has been applied to quantify the degree of stiffness and rigidity in undergraduate engineering curricula at the American University of Sharjah (AUS, the University of Sharjah (UOS, United Arab Emirates University (UAEU, and the Petroleum Institute (PI, which are the leading universities in the United Arab Emirates. Results indicate high rigidity (low relaxation indices due to high degree of interconnectivity between courses, specifically in the second year of the study plans. The chemical engineering curriculum at PI exhibited the least flexibility due to very strong pre-and-co-requisite ties while the civil & environmental curriculum at UAEU showed the highest flexibility. The curricula considered require immediate attention and reorganization in order to facilitate smooth sequential progress of the students from one semester to another. A list of courses that require relaxation of strong pre-and corequisites ties has been presented for each curriculum.
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, ...
Full Text Available Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As cyberadversaries have become more mature, sophisticated, and disciplined in their tradecraft, the science of security engineering has not kept pace. The evidence of the erosion of our digital security – upon which society is increasingly dependent – appears in the news almost daily. In this article, we outline a research agenda designed to begin addressing this deficit and to move information system security engineering toward a mature engineering discipline. Our experience suggests that there are two key areas in which this movement should begin. First, a threat model that is actionable from the perspectives of risk management and security engineering should be developed. Second, a practical and relevant security-measurement framework should be developed to adequately inform security-engineering and risk-management processes. Advances in these areas will particularly benefit business/government risk assessors as well as security engineers performing security design work, leading to more accurate, meaningful, and quantitative risk analyses and more consistent and coherent security design decisions. Threat modelling and security measurement are challenging activities to get right – especially when they need to be applied in a general context. However, these are decisive starting points because they constitute the foundation of a scientific security-engineering practice. Addressing these challenges will require stronger and more coherent integration between the sub-disciplines of risk assessment and security engineering, including new tools to facilitate that integration. More generally, changes will be required in the way security engineering is both taught and practiced to take into account the holistic approach necessary from a mature, scientific
Vazquez, J. L.; Serrano, A.; Caniego, J.
Due to the introduction of new degrees on the College of Agricultural Engineering of the Technical University of Madrid adapted to the European Space for Higher Education (Bologna), we have made a comparative study of academic achievement obtained by the students during their first year at the Centre according to different curricula. We used data from 2 curricula leading to the degree in Agricultural Engineering, Curriculumn 74 (6 years and annual structure) and Curriculum 96 modified in 2006 (5 years with quarterly structure) and the new curriculum in grades (4 years semi-structured). It has been used as a data source, the qualifications of new students during the last three years prior to the extinction of the curriculum.The study shows that current rates of academic success or failure and dropout during the first year of college are very similar to those happening 12 years ago, when it was assumed that the preparation of students from high school was much higher than today. Keywords: Academic performance, curricula, Bologna.
Ford, Julie Dyke
This program profile describes a new approach towards integrating communication within Mechanical Engineering curricula. The author, who holds a joint appointment between Technical Communication and Mechanical Engineering at New Mexico Institute of Mining and Technology, has been collaborating with Mechanical Engineering colleagues to establish a…
Shea, John E.
The structure of engineering curricula currently in place at most colleges and universities has existed since the early 1950's, and reflects an historical emphasis on a solid foundation in math, science, and engineering science. However, there is often not a close match between elements of the traditional engineering education, and the skill sets that graduates need to possess for success in the industrial environment. Considerable progress has been made to restructure engineering courses and curricula. What is lacking, however, are tools and methodologies that incorporate the many dimensions of college courses, and how they are structured to form a curriculum. If curriculum changes are to be made, the first objective must be to determine what knowledge and skills engineering graduates need to possess. To accomplish this, a set of engineering competencies was developed from existing literature, and used in the development of a comprehensive mail survey of alumni, employers, students and faculty. Respondents proposed some changes to the topics in the curriculum and recommended that work to improve the curriculum be focused on communication, problem solving and people skills. The process of designing a curriculum is similar to engineering design, with requirements that must be met, and objectives that must be optimized. From this similarity came the idea for developing a linear, additive, multi-objective model that identifies the objectives that must be considered when designing a curriculum, and contains the mathematical relationships necessary to quantify the value of a specific alternative. The model incorporates the three primary objectives of engineering topics, skills, and curriculum design principles and uses data from the survey. It was used to design new courses, to evaluate various curricula alternatives, and to conduct sensitivity analysis to better understand their differences. Using the multi-objective model to identify the highest scoring curriculum
Radian G. Belu
Full Text Available Human society is facing an uncertain future due to the present day unsustainable use of natural resources and the growing imbalance with our natural environment. Sustainability is an endeavour with uncertain outcomes requiring collaboration, teamwork, and abilities to work with respect and learn from other disciplines and professions, as well as with governments, local communities, political and civic organizations. The creation of a sustainable society is a complex and multi-stage endeavour that will dominate twenty first century. Sustainability has four basic aspects: environment, technology, economy, and societal organization. Schools with undergraduate engineering or engineering technology programs are working to include sustainability and green design concepts into their curricula. Teaching sustainability and green design has increasingly become an essential feature of the present day engineering education. It applies to all of engineering, as all engineered systems interact with the environment in complex and important ways. Our project main goals are to provide the students with multiple and comprehensive exposures, to what it mean to have a sustainable mindset and to facilitate the development of the passion and the skills to integrate sustainable practices into engineering tools and methods. In this study we are describing our approaches to incorporating sustainability and green design into our undergraduate curricula and to list a variety of existing resources that can easily be adopted or adapted by our faculty for this purpose. Our approaches are: (1 redesigning existing courses through development of new curricular materials that still meet the objectives of the original course and (2 developing upper division elective courses that address specific topics related to sustainability, green design, green manufacturing and life-cycle assessment.
Magnell, Marie; Geschwind, Lars Allan; Kolmos, Anette
The purpose of this paper is to identify faculty perspectives on the integration of work-related issues in engineering education. A mixed methods approach was used to explore faculty attitudes towards work-related learning, to describe activities related to working life that have been introduced...... into the curriculum and to identify factors that faculty see as important if the amount of work-related learning is to increase. The results show that faculty members are positive about integrating work-related issues into the curriculum. Programmes with more extensive connections to industry offer more integrated...... activities, such as projects with external actors, and use professional contacts established through research in their teaching. In order to increase work-related learning in engineering curricula, faculty request clear goals and pedagogical tools. Other options to increase work-related learning include...
Security Engineering – FY17 Systems Aware Cybersecurity Technical Report SERC-2017-TR-114 December 7 2017 Principal Investigator: Dr...December 7, 2017 Copyright © 2017 Stevens Institute of Technology, Systems Engineering Research Center The Systems Engineering Research Center (SERC...supported, in whole or in part, by the U.S. Department of Defense through the Office of the Assistant Secretary of Defense for Research and Engineering (ASD
Silveira, A.; Perdigones, A.; García, J. L.
Deally, an engineering education should prepare students, i.e., emerging engineers, to use problem-solving processes that synergistically combine creativity and imagination with rigour and discipline. Recently, pressures on curricula have resulted in the development of software-specific courses, often to the detriment of the understanding of theory . However, it is also true that there is a demand for information technology courses by students other than computer science majors . The emphasis on training engineers may be best placed on answering the needs of industry; indeed, many proposals are now being made to try to reduce the gap between the educational and industrial communities . Training in the use of certain computer programs may be one way of better preparing engineering undergraduates for eventual employment in industry. However, industry's needs in this respect must first be known. The aim of this work was to determine which computer programs are used by practising agricultural engineers with the aim of incorporating training in their use into our department's teaching curriculum. The results showed that 72% of their working hours involved the use computer programs. The software packages most commonly used were Microsoft Office (used by 79% of respondents) and CAD (56%), as well as budgeting (27%), statistical (21%), engineering (15%) and GIS (13%) programs. As a result of this survey our university department opened an additional computer suite in order to provide students practical experience in the use of Microsoft Excel, budgeting and engineering software. The results of this survey underline the importance of computer software training in this and perhaps other fields of engineering.  D. J. Moore, and D. R. Voltmer, "Curriculum for an engineering renaissance," IEEE Trans. Educ., vol. 46, pp. 452-455, Nov. 2003.  N. Kock, R. Aiken, and C. Sandas, "Using complex IT in specific domains: developing and assessing a course for nonmajors
Kastenhofer, Karen; Lansu, Angelique; Van Dam-Mieras, Rietje; Sotoudeh, Mahshid
Global failures to reach a sustainable development within present-day societies as well as recent breakthroughs within technoscience pose new challenges to engineering education. The list of competencies which engineers should have to rise to these challenges is long and diverse, and often
The participants of the Meeting have agreed to conclude: 1. The participants have been acquainted with the following: a. Curricula on nuclear science and nuclear engineering of the host country - Russia, as well as of the Republic of Korea, India and Vietnam; b. Nuclear education activities of the World Nuclear University (WNU); c. Nuclear education facilities at Moscow Engineering Physics Institute (MEPhI). 2. Discussions and analysis were made on the curricula in nuclear engineering education in the Region. 3. Main efforts were focused on developing a draft of the ANENT Reference Curricula for Master's Degree in Nuclear Engineering. The skeleton of the first draft of the Reference Curricula was created. 4. The idea about the ANENT Master's Degree in Nuclear Engineering (ANENT MDNE) was discussed. Realization of such degree would strongly and directly enhance and heighten the regional educational level in nuclear engineering in the near future. It is also expected to facilitate credit transfer and mutual recognition of degrees within the ANENT member countries in line with the ANENT's long term goals. 5. It was suggested to conduct an intensive exchange of opinions between experts and educators in the ANENT member countries to develop the ANENT MDNE further based on the skeleton of the draft. 6. It was preferable to start more extensive discussion about the idea of the ANENT MDNE and how to realize it effectively and reasonably as soon as possible. 7. The ANENT members were encouraged to discuss about ANENT Activity 4 at the next Meeting of the ANENT Coordination Committee. 8. The participants expressed their heartfelt thanks to the collective of Moscow Engineering Physics Institute (MEPhI) - the Host Organization - and to all the members of the Local Organizing Committee of the Meeting, as well as to the ANENT Scientific Secretary, for the warm atmosphere and perfect conditions provided for the success of the Meeting
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized...... and applications, high-performance computing in cryptology and cryptography in ubiquitous devices....
Darwish, Naif A.; Qasim, Muhammad
In academia, smooth progression of students significantly depends on the way curricula are developed and organized. Curricula or study plans with high degree of interconnectivity between courses, multiple prerequisites, and hierarchically structured courses tend to complicate the smooth progress of the enrolled students. In this work, a rigorous…
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard
The Systems Security Engineering Capability Maturity Model (SSE-CMM) describes the essential characteristics of an organization's security engineering process that must exist to ensure good security engineering...
Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.
Bruun, Erik; Nielsen, Ivan Ring
-electronic devices (such as bio-devices or chemical devices), and possibilities for developing fundamentally new nanoscale electronic devices. New engineering curricula in nanoelectronics must take these developments into account. A model for the development of new curricula is presented and some representative...
Su Hyung Jo; Ki Young Kim; Sang Ho Lee
Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...
Jelena S. Cice
Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: - Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. - Promulgation of multi-service standard recommendations and considerations. - Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. - Reduction of facility project costs. - Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be
Massacci, F.; Mylopoulos, J.; Zannone, N.; Ras, Z.W.; Tsay, L.-S.
Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as
NEISSE RICARDO; STERI GARY; NAI FOVINO Igor; BALDINI Gianmarco; VAN HOESEL Lodewijk
We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the control and protection of user data in the deployment of the Internet of Things (IoT). This toolkit takes a more general approach for security engineering including risk analysis, establishment of aspect-specific trust relationships, and enforceable security policies. We describe the integrated metamodels used in the toolkit and the accompanying security engineering methodology for IoT systems...
The approaches to the definition of financial engineering and its methods are highlighted, advisability of application of the new securities types created on the basis of financial engineering in Ukrainian corporate financing is grounded.
Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.
The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…
The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...
Raghunathan, V.S.; Chung, B.J.; Duan, P.V.
Subject contents in the following areas are presented in detail: Advanced Mathematics for Nuclear Engineering; Advanced Numerical Analysis; Advanced Computer Applications; Engineering Physics; Introduction to Nuclear Engineering (Core); Radiation Detection and Measurements (Core); Radiation Safety and Shielding; Power Plant Instrumentation; Nuclear Safety; Nuclear and Reactor Physics; Health Physics; Nuclear Heat Transfer; Nuclear Power Plants Engineering; Materials Science in Nuclear Engineering; Neutron Transport Theory; Reactor Kinetics; Advanced Nuclear Heat Transfer; Nuclear Reactor Numerical Analysis; Nuclear Fuel Cycle and Non-Proliferation; Power Reactor Design (System Engineering); Advanced Nuclear Safety; Probabilistic Safety Analysis; Strategy and Infrastructure for Nuclear Power; NPP Control and Instrumentation; Nuclear Regulation; Nuclear Material Engineering; Radiation Protection and Shielding; Application of Radioisotope and Radiation Sources; Non-Destructive Testing; Nuclear Imaging; Radioactive Waste Management; Advanced Health Physics; Applied Radiation Measurements; Advanced Laser Application Engineering; Advanced Quantum Engineering; Plasma Diagnostics; Plasma Processing Analysis; Advanced Plasma Engineering; Nuclear Spectroscopy; Thermonuclear Fusion Engineering
Guillen, Edward Paul; Quintero, Rulfo
Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.
Sabo, Chelsea; Burrows, Andrea; Childers, Lois
Projects highlighting Science, Technology, Engineering, and Mathematics (STEM) education in high schools have promoted student interest in engineering-related fields and enhanced student understanding of mathematics and science concepts. The Science and Technology Enhancement Program (Project STEP), funded by a NSF GK-12 grant at the University of…
Bowring, James; Burke, Quinn
This paper documents four years of a novel approach to teaching a two-course sequence in software engineering as part of the ABET-accredited computer science curriculum at the College of Charleston. This approach is team-based and centers on learning software engineering in the context of open source software projects. In the first course, teams…
Findley, M. E.
Chemical engineers in developing countries may need abilities in a number of diverse areas including management, planning, chemistry, equipment, processes, politics, and improvisation. Chemical engineering programs for foreign students can be arranged by informed advisers with student input for inclusion of some of these areas in addition to…
Mead, Nancy R
The Security Quality Requirements Engineering (SQUARE) method, developed at the Carnegie Mellon Software Engineering Institute, provides a systematic way to identify security requirements in a software development project...
Liu Yachun; Zou Shuliang; Yang Xiaohua; Ouyang Zigen; Dai Jianyong
In the field of nuclear safety, traditional work places extra emphasis on risk assessment related to technical skills, production operations, accident consequences through deterministic or probabilistic analysis, and on the basis of which risk management and control are implemented. However, high quality of product does not necessarily mean good safety quality, which implies a predictable degree of uniformity and dependability suited to the specific security needs. In this paper, we make use of the system security engineering - capability maturity model (SSE-CMM) in the field of spent fuel reprocessing, establish a spent fuel reprocessing systems security engineering capability maturity model (SFR-SSE-CMM). The base practices in the model are collected from the materials of the practice of the nuclear safety engineering, which represent the best security implementation activities, reflect the regular and basic work of the implementation of the security engineering in the spent fuel reprocessing plant, the general practices reveal the management, measurement and institutional characteristics of all process activities. The basic principles that should be followed in the course of implementation of safety engineering activities are indicated from 'what' and 'how' aspects. The model provides a standardized framework and evaluation system for the safety engineering of the spent fuel reprocessing system. As a supplement to traditional methods, this new assessment technique with property of repeatability and predictability with respect to cost, procedure and quality control, can make or improve the activities of security engineering to become a serial of mature, measurable and standard activities. (author)
The health industry is an important and growing economic engine. Advances are being made in pharmaceutical and biotechnology discoveries and their applications (including manufacturing), as well as in health care services. As a result, there is an increasing sophistication of the products and services available and being developed, with an…
The article states the analysis of the curriculum that regulates the main purposes, essence and directions for petroleum training. The importance and necessity of positive usage of Austrian, English and Norwegian experience at the time of petroleum engineers training in the petroleum industry has been stressed on. The structure and content of…
Matejka, K.; Zeman, J.
The Faculty of Nuclear Science and Physical Engineering, Czech Technical University in Prague has been educating nuclear power engineering experts for nearly half a century. The article describes the current status and prospects of education of new specialists at the faculty for all nuclear power-related areas within the MSc and BSc level curricula. The current transition to 'European type' structured education, enabling students who have graduated from the BSc programme to continue smoothly their MSc programme, is outlined. The major courses of the 'Nuclear Engineering' educational specialisation, focused on nuclear power, environment, and dosimetry, are highlighted, including the number of lessons taught in each study year. (author)
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the c
Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal,
Aziz, Benjamin; Crispo, Bruno
This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability.
Nunes Leal Franqueira, V.; van Cleeff, A.; van Eck, Pascal; Wieringa, Roelf J.
Companies are increasingly engaging in complex inter-organisational networks of business and trading part- ners, service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of
Acosta, Hugo Andrés Lópes; Massacci, Fabio; Zannone, Nicola
that they are somehow “equivalent”. In this paper we propose a method for passing from SI*, a modeling language for capturing and modeling functional, security, and trust organizational and system requirements, to business process specifications and vice versa. In particular, starting from an old secure business......The introduction of information technologies in health care systems often requires to re-engineer the business processes used to deliver care. Obviously, the new and re-engineered processes are observationally different and thus we cannot use existing model-based techniques to argue...... process, we reconstruct the functional and security requirements at organizational level that such a business process was supposed to meet (including the trust relations that existed among the members of the organization). To ensure that the re-engineered business process meets the elicited requirements...
At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…
Jia, Shande; Ao, Qian
Developing a SP is a sensitive task because the SP itself can lead to security weaknesses if it is not conform to the security properties. Hence, appropriate techniques are necessary to overcome such problems. These techniques must accompany the policy throughout its deployment phases. The main contribution of this paper is then, the proposition of three of these activities: validation, test and multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.
The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access
content. The curriculum development efforts are accompanied by exercises that expose students to practical tools and resources for security engineering...with relatively simple analytical features, but high pedagogical value. Information Assurance Courses Curriculum development has occurred for...tool chain and accompanying methodology confronts serious challenges posed by large heterogeneous networks (e.g., SCADA and corporate systems) from
Gilliam, David P.; Feather, Martin S.
Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.
Samuel T. C. Thompson
Full Text Available Social engineering is the use of nontechnical means to gain unauthorized access to information or computer systems. While this method is recognized as a major security threat in the computer industry, little has been done to address it in the library field. This is of particular concern because libraries increasingly have access to databases of both proprietary and personal information. This tutorial is designed to increase the awareness of library staff in regard to the issue of social engineering.
Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn
The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.
Full Text Available This paper discusses the organizational and methodological foundations and methods exploited to forecast, analyze and scale down threats and risks in the sphere of economic security, to solve the adaptation problems, to implement and to evaluate of the potency of protective measures. The object of the conducted research is associated with various economic activities of the commercial enterprises affiliated in Rostov region. A suggested model of the formation and functioning of adaptive engineering tools for managing economic security in the form of derivative balance of the enterprise resources and the sources of their formation will allow the proprietors, executive board and mana-gerial staff to obtain necessary information within the requested context regarding the enterprise vital economic interests. In addition, the paper pays attention to the methodological aspects of accounting description and estimation of the iterative achievements to meet the desired adaptation results, implemented within the framework of the described iterative algorithm aimed at ensuring strategic prediction.
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Boiko, Vladimir I.; Demyanyuk, Dmitry G.; Silaev, Maxim E.; Duncan, Cristen L.; Heinberg, Cynthia L.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.
Over the last six years, Tomsk Polytechnic University (TPU) has developed a 5 1/2 year engineering degree program in the field of Material Protection Control and Accounting (MPC and A). In 2009 the first students graduated with this new degree. There were 25 job offers from nuclear fuel cycle enterprises of Russia and Kazakhstan for 17 graduates of the program. Due to the rather wide selection of workplaces, all graduates have obtained positions at nuclear enterprises. The program was developed within the Applied Physics and Engineering Department (APED). The laboratory and methodological base has been created taking into consideration the experience of the similar program at the Moscow Engineering Physics Institute (MEPhI). However, the TPU program has some distinguishing features such as the inclusion of special courses pertaining to fuel enrichment and reprocessing. During the last two years, three MPC and A laboratories have been established at APED. This was made possible due to several factors such as establishment of the State innovative educational program at TPU, assistance of the U.S. Department of Energy through Pacific Northwest National Laboratory and Los Alamos National Laboratory, and the financial support of the Swedish Radiation Safety Authority and some Russian private companies. All three of the MPC and A laboratories are part of the Innovative Educational Center 'Nuclear Technologies and Non-Proliferation,' which deals with many topics including research activities, development of new curricula for experts training and retraining, and training of master's students. In 2008, TPU developed a relationship with the International Atomic Energy Agency (IAEA), which was familiarized with APED's current resources and activities. The IAEA has shown interest in creation of a master's degree educational program in the field of nuclear security at TPU. A future objective is to acquaint nuclear fuel cycle enterprises with new APED capabilities and involve
Bruun, Erik; Nielsen, Ivan Ring
Future developments in nanoelectronics call for major changes in university curricula within engineering. It is found that three major factors influence the curricula: technology development, development of industrial environment, and development of university structures. It is also found that na...... that nanoelectronics programs fall into one of three different categories: Physics and nanotechnology, electronics engineering, or computer science. References are given to selected current programs....
Hayden, Nancy J.; Rizzo, Donna M.; Dewoolkar, Mandar M.; Neumann, Maureen D.; Lathem, Sandra; Sadek, Adel
This paper presents a brief overview of the changes made during our department level reform (DLR) process (Grant Title: "A Systems Approach for Civil and Environmental Engineering Education: Integrating Systems Thinking, Inquiry-Based Learning and Catamount Community Service-Learning Projects") and some of the effects of these changes on…
Dealing with security is a central activity for todays organizations. Security breaches impact on the activities executed in organizations, preventing them to execute their business processes and, therefore, causing millions of dollars of losses. Security by design principles underline the importance of considering security as early as during the design of organizations to avoid expensive fixes during later phases of their lifecycle. However, the design of secure business processes cannot tak...
In his 1960 essay, Eugene Wigner raised the question of ‿the unreasonable effectiveness of mathematics in natural sciences‿. After several decades of security research, we are tempted to ask the opposite question: Are we not unreasonably ineffective? Why are we not more secure from all the security
... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of... applicable): (i) “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS...
Full Text Available The purpose of the research is to discover which employability skills may be developed by students from technical universities in order to meet market demands. Since graduates from technical universities face unemployment or over qualification for vacant jobs, we presumed that there is a misalignment between employers’ expectations concerning graduates’ skills and what they really get from school. Therefore, we conceived a questionnaire to see the demands of the business environment regarding graduates’ technical and professional skills. After analyzing the data, we proposed an interdisciplinary module system, where the mentors coming from the companies involved in the study teach voluntary or optional courses and applications in the domains where they have expertise. We used the employability skills model to find that mix of competencies that may help graduates find jobs in their field of knowledge. This innovative method serves universities, students and companies as well: the prestige of a university is quantified by the experts delivered into the labor market; companies will have well prepared employees in their specific area, with less costs; students will find jobs which will match their expectations, giving them motivation to perform. The limitation of the present research is that the study refers only to the Civil Engineering specialization of the Technical University Cluj-Napoca Romania.
This document is designed to acquaint the reader with the SSE-CMM Project as a whole and present the project's major work product - the Systems Security Engineering Capability Maturity Model (SSE- CMM...
Licciardello, Feliciana; Consoli, Simona; Atlaw, Tigist; Nicastro, Roberto; Brígido, Consuelo C.; Lorite, Ángela; Taguas, Encarnación V.
The co-operation between Universities located in different countries, promoting similar topics and teaching methodologies, is paramount in the educational training to meet the objectives of the Bologna Process and developing new skills matching the labor market requirements. With this focus, the work herein presented contributes to both these aims, by implementing, in two Universities courses in Spain and Italy, a joint methodology in Hydrology. Both courses present common matters related with hydrological engineering projects. "Water Resources Management in Agriculture" is the course name at the University of Catania, Italy whereas "Software and tools in Engineering projects" is the subject tough for the students of Forest Engineering in the Agronomist and Forest Engineering School of the University of Cordoba. This work presents an experience whose main objective is to involve the students into the technical knowledge and skill acquisition by a competition, following the philosophy of football leagues which are quite appreciated in both countries. Basically, we have prepared a practical case of hydrological design which two-student groups have to solve. The best teams of each country have to play the international final match, which will take place by videoconference. The awards for the winners in each country are merits for their curricula such as the participation in the EGU Assembly 2014 and a certificate of winners. The practical case is based on the Curve Number method developed by the Soil Conservation Service (1972) in order to compute abstractions from storm rainfall and calculate design hydrographs (CN-SCS method). The CN-SCS method is one of the most used methods for implementing hydrological studies of a catchment aimed for example at assessing management practices and hydro-geological risk plans as well as water resources protection measures. In general hydro-geological risk assessment and modeling studies are necessary for a reliable urban planning
Pinelli, Thomas E.; And Others
Reports on results from 260 aerospace engineers and scientists in United States, Europe, and Japan regarding their opinions about professional importance of technical communications; generation and utilization of technical communications; and relevant content of an undergraduate course in technical communications. The fields of cryogenics,…
Lugacheva L. I.
Full Text Available The article shows the importance of regional engineering for the Russian economy, it clarifies the factors of economic security of the Novosibirsk region (NSO. Analyzed the characteristics prevailing in the engineering industry, its competitive advantages. The research results of the export orientation of the regional engineering VAT: its direction and priorities; discusses the trends that influence the growth during the recovery has formed a new profile of its foreign economic relations. Threats identified in the development of engineering and to propose measures to overcome them to ensure the economic security of the region. The article deals with the problem-tional institutes provide for the sustainable development of regional engineering, discusses the possibility of using pub-lic-private partnerships. Sharing of risks and responsibilities between the subject of the Russian Federation, municipalities and entrepreneurs - one of the priorities in the creation of the necessary conditions for the economic security of the NSO.
Muhammad Qaiser Saleem; Jafreezal Jaafar; Mohd Fadzil Hassan
Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of development and left onto developer. Properly configuring security requirements in SOA applications is...
.... ACE achieved its stated objectives by completely immersing students in the cyber-security discipline for ten weeks, through a combination of intense coursework, open-ended problems, and internship...
Jordan, C.W.; Niven, W.A.; Cavitt, R.E. [and others
Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.
Putero, Susetyo Hario; Rosita, Widya; Sihana, Fnu; Ferdiansjah; Santosa, Haryono Budi; Muharini, Anung
Recently, risk management for nuclear facilities becomes more complex due to security issue addressed by IAEA. The harmonization between safety, safeguards and security is still questionable. It also challenges to nuclear engineering curriculum in the world how to appropriately lecture the new issue. This paper would like to describe how to integrate this issue in developing nuclear engineering curriculum in Indonesia. Indonesia has still no nuclear power plant, but there are 3 research reactors laid in Indonesia. As addition, there are several hospitals and industries utilizing radioisotopes in their activities. The knowledge about nuclear security of their staffs is also not enough for handling radioactive material furthermore the security officers. Universitas Gadjah Mada (UGM) is the only university in Indonesia offering nuclear engineering program, as consequently the university should actively play the role in overcoming this issue not only in Indonesia, but also in Southeast Asia. In the other hand, students has to have proper knowledge in order to complete in the global nuclear industry. After visited several universities in USA and participated in INSEN meeting, we found that most of universities in the world anticipate this issue by giving the student courses related to policy (non-technical) study based on IAEA NSS 12. In the other hand, the rest just make nuclear security as a case study on their class. Furthermore, almost all of programs are graduate level. UGM decided to enhance several present related undergraduate courses with security topics as first step to develop the awareness of student to nuclear security. The next (curriculum 2016) is to integrate security topics into the entire of curriculum including designing a nuclear security elective course for undergraduate level. The first trial has successfully improved the student knowledge and awareness on nuclear security. (author)
Soules, Aline; Nielsen, Sarah; LeDuc, Danika; Inouye, Caron; Singley, Jason; Wildy, Erica; Seitz, Jeff
In fall 2012, an interdisciplinary team of science, English, and library faculty embedded reading, writing, and information literacy strategies in Science, Technology, Engineering, and Mathematics (STEM) curricula as a first step in improving student learning and retention in science courses and aligning them with the Next Generation Science and…
Collantes, Maria I. Mera; Massad, Mohamed El; Garg, Siddharth
With current tools and technology, someone who has physical access to a chip can extract the detailed layout of the integrated circuit (IC). By using advanced visual imaging techniques, reverse engineering can reveal details that are meant to be kept secret, such as a secure protocol or novel implementation that offers a competitive advantage. A promising solution to defend against reverse engineering attacks is IC camouflaging. In this work, we propose a new camouflaging technique based on t...
Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz
The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy
Kryuchkov, Eduard F.; Geraskin, Nikolay I.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.
The world's first master's degree program in nuclear safeguards and security, established at Moscow Engineering Physics Institute (MEPhI), has now graduated nine classes of students. Most of the graduates have gone on to work at government agencies, research organizations, or obtain their PhD. In order to meet the demand for safeguards and security specialists at nuclear facilities, MEPhI established a 5-1/2 year engineering degree program that provides more hands-on training desired by facilities. In February 2004, the first students began their studies in the new discipline Nuclear Material Safeguards and Nonproliferation. This class, as well as other subsequent classes, included students who started the program in their third year of studies, as the first 2-1/2 years consists of general engineering curriculum. Fourteen students made up the first graduating class, receiving their engineering degrees in February 2007. The topics addressed in this paper include specific features of the program caused by peculiarities of Russian education legislation and government quality control of academic education. This paper summarizes the main joint actions undertaken by MEPhI and the US National Laboratories in conjunction with the U.S. Department of Energy, to develop the engineering degree program. Also discussed are the program's specific training requirements, student internships, and job placement. The paper concludes with recommendations from a recent international seminar on nonproliferation education and training
Massacci, F.; Prest, M.; Zannone, N.
Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level
Liu Zhenghai; Yang Xiaohua; Zou Shuliang; Liu Yachun; Xiao Jiantian; Liu Zhiming
Spent Fuel Reprocessing is a part of nuclear fuel cycle and is the inevitably choice of nuclear power sustainable development. Reprocessing needs to face with radiological, criticality, chemical hazards. Besides using the tradition appraisal methods based on the security goals, it is a beneficial supplement that using the appraisal method of system security engineering capability maturity model based on the process. Experts should check and approve large numbers of documents during the appraisal based on system security engineering capability maturity model, so it is necessary that developing a tool to assist the expert to complete the appraisal. The method of developing software based on component is highly effective, nimble and reliable. Component technology is analyzed, the methods of extraction model domain components and general components is introduced, and the appraisal system is developed based on component technology. (authors)
Moore, J.W.; Banks, W.W.
This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad
Bruun, Erik; Nielsen, I
Nanotechnology is having an increasing impact on university curricula in electrical engineering and in physics. Major influencers affecting developments in university programmes related to nanoelectronics are discussed and a model for university programme development is described. The model takes...... engineering. Examples of European curricula following this framework are identified and described. These examples may serve as sources of inspiration for future developments and the model...
Education Week, 2013
This special report is the latest installment in an ongoing series about how online education is changing teaching and learning and the development of curricula. It was produced with support from the Bill & Melinda Gates Foundation and the Carnegie Corporation of New York. This paper contains the following articles: (1) Changing the Role of K-12…
everyday life. According to the CommonSenseMedia organization, ―Kids and teens today are using the immense power of digital media to explore, connect...anything too sexy to be passed aro~.r~d the dinner table should NOT make it on to the web, as it couJd encourage sexual predators to contact you. o
Managers and engineers at the Federal Highway : Administration (FHWA) and State Departments of : Transportation (DOTs) indicate that they need researchers, : employees, consultants, and regulators who understand the : unique challenges involved in ma...
Blaser, Tammy M.
NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.
This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.
Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.
Tiago M. Fernández-Caramés
Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.
Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119
Michael R. Melton
Full Text Available Purpose – The purpose of this paper is to introduce instruction of technical analysis on the undergraduate level that can coincide with traditional teachings of fundamental analysis. Design/methodology/approach – Through examples using the latest in security analysis technology, this paper illustrates the importance of technical security analysis. Findings – This research illustrates how technical analysis techniques may be used to make more significant investment decisions. Originality/value – Kirkpatrick and Dahlquist define technical analysis as a security analysis discipline for forecasting future direction of prices through the study of past market data primarily price and volume This form of analysis has stood in direct contrast to the fundamental analysis approach whereby actual facts of the company its industry and sector may be ignored. Understanding this contrast, much of academia has chosen to continue to focus its finance curricula on fundamental analysis techniques. As more universities implement trading rooms to reflect that of industry, they must recognize that any large brokerage trading group or financial institution will typically have both a technical analysis and fundamental analysis team. Thus, the need to incorporate technical analysis into undergraduate finance curricula.
Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha
...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...
Rice, M. J.
The primary purpose of the Georgia Anthropology Curriculum Project is to present the organizing concepts of anthropology in curricula suitable for use in elementary and intermediate grades. The philosophic premise of the Project is that a conceptually structured curricula is the most effective means of helping students to acquire a base of…
Gill, Sarvajeet Singh; Gill, Ritu; Tuteja, Renu; Tuteja, Narendra
Crop improvement has been a basic and essential chase since organized cultivation of crops began thousands of years ago. Abiotic stresses as a whole are regarded as the crucial factors restricting the plant species to reach their full genetic potential to deliver desired productivity. The changing global climatic conditions are making them worse and pointing toward food insecurity. Agriculture biotechnology or genetic engineering has allowed us to look into and understand the complex nature of abiotic stresses and measures to improve the crop productivity under adverse conditions. Various candidate genes have been identified and transformed in model plants as well as agriculturally important crop plants to develop abiotic stress-tolerant plants for crop improvement. The views presented here are an attempt toward realizing the potential of genetic engineering for improving crops to better tolerate abiotic stresses in the era of climate change, which is now essential for global food security. There is great urgency in speeding up crop improvement programs that can use modern biotechnological tools in addition to current breeding practices for providing enhanced food security.
Gatling, Anne; Vaughn, Meredith Houle
Engineering is not a subject that has historically been taught in elementary schools, but with the emphasis on engineering in the "Next Generation Science Standards," curricula are being developed to explicitly teach engineering content and design. However, many of the scientific investigations already conducted with students have…
Full Text Available With the emergence of the Internet of Things (IoT, a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.
Oh, Doohwan; Kim, Deokho; Ro, Won Woo
With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.
Oh, Doohwan; Kim, Deokho; Ro, Won Woo
With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382
Pedersen, Henrik C.; Andersen, Torben Ole; Rasmussen, Peter Omand
, it is addressed how a mechatronic education is structured so courses and projects are aligned, to utilize the full benefits of the Problem Oriented Project Based Learning (POPBL) system practiced at AalborgUniversity (AAU). This is followed by a presentation of the two complementary educations in Mechatronicsat...... using a subsystem based approach. The challenges related to teaching and learning mechatronics are addressed, discussing how mechatronics is typically taught around the world also illustrating the trends and applications of mechatronic engineering and research. This is followed by an outline...... Based Learning environment....
Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo
This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...
Bruun, E.; Nielsen, I.
Nanotechnology is having an increasing impact on university curricula in electrical engineering and in physics. Major influencers affecting developments in university programmes related to nanoelectronics are discussed and a model for university programme development is described. The model takes into account that nanotechnology affects not only…
Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu
Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…
The expansion of nuclear power is taxing human, material, and capital resources in developed and developing countries. This paper explores the human resources as represented by employment, graduation statistics, and educational curricula for nuclear engineers. (E.C.B.)
Snapp, Shannon D.; McGuire, Jenifer K.; Sinclair, Katarina O.; Gabrion, Karlee; Russell, Stephen T.
There is growing attention to lesbian, gay, bisexual, transgender, queer and questioning (LGBTQ) issues in schools, including efforts to address such issues through the curriculum. This study examines whether students' perceptions of personal safety and school climate safety are stronger when curricula that include LGBTQ people are present and…
Elahi, G.; Yu, E.; Zannone, N.
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements
Casais, M.; Christiaans, H.H.C.M.; Almendra, R.
While sustainability in Design finds much attention in the literature, the education of sustainability in Design courses lacks discussion regarding curricula and importance. In an attempt to map the way sustainability is taught in Design Bachelor and Master Courses in the European Union, we began
Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…
Ali, Nagia S; Carlton, Kay Hodson; Ali, Omar S
Telehealth care is a fast-growing avenue of providing health care services at a distance. A descriptive study was conducted to identify trends of telehealth education in 43 schools of nursing. Findings reflected inadequate integration of telehealth in classroom content, simulation, and clinical experiences. Interviews with 4 nursing leaders of telehealth provided some recommendations on how to integrate telehealth education in nursing curricula.
Lewsader, Joellen; Myers-Walls, Judith A.
Peace education has been offered to children for decades, but those curricula have been only minimally guided by children's developmental stages and needs. In this article, the authors apply their research on children's developmental understanding of peace along with peace education principles and Vygotsky's sociocultural theory to present…
Full Text Available Construction sites are accident-prone locations and therefore safety management plays an im-portant role in these workplaces. This study presents an adaptive algorithm for performance as-sessment of project management with respect to resilience engineering and job security in a large construction site. The required data are collected using questionnaires in a large construction site. The presented algorithm is composed of radial basis function (RBF, artificial neural networks multi-layer perceptron (ANN-MLP, and statistical tests. The results indicate that preparedness, fault-tolerance, and flexibility are the most effective factors on overall efficiency. Moreover, job security and resilience engineering have similar statistical impacts on overall system efficiency. The results are verified and validated by the proposed algorithm.
NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 21: Technological innovation and technical communications: Their place in aerospace engineering curricula. A survey of European, Japanese, and US Aerospace Engineers and Scientists
Pinelli, Thomas E.; Barclay, Rebecca O.; Holland, Maurita Peterson; Keene, Michael L.; Kennedy, John M.
Aerospace engineers and scientists from Western Europe, Japan, and the United States were surveyed as part of the NASA/DoD Aerospace Knowledge Diffusion Research Project. Questionnaires were used to solicit their opinions regarding the following: (1) the importance of technical communications to their profession; (2) the use and production of technical communications; and (3) their views about the appropriate content of an undergraduate course in technical communications. The ability to communicate technical information effectively was very important to the aerospace engineers and scientists who participated in the study. A considerable portion of their working week is devoted to using and producing technical information. The types of technical communications used and produced varied within and among the three groups. The type of technical communication product used and produced appears to be related to respondents' professional duties. Respondents from the three groups made similar recommendations regarding the principles, mechanics, and on-the-job communications to be included in an undergraduate technical communications course for aerospace majors.
Bouhelal, Oum Keltoum [National School of Mineral Industry, ENIM, BP 753, Agdal, 10000 Rabat (Morocco)
In the area of Energy Engineering, high education programs including nuclear activities are currently running in collaboration with the employment sector to provide skills oriented profiles; the available packages are thus characterized by a limited size and a low impact in enhancing power technology teaching and industrial partnerships. However, ongoing nuclear applications activities are undertaken through strong legal and institutional infrastructures as Morocco has joined a large number of international conventions and agreements trusted by the IAEA. The introduction of nuclear power is subject to a close attention today to investigate if it is an alternative solution to meet the increasing energy needs. For a country not much industrialized and characterized by a medium electricity grid, the decision on the recourse to nuclear power needs to carry up early a training, R and D federative program on behalf of the engineering sector and the international cooperation. As the challenges associated to develop a successful nuclear power program requires an important effort directed toward increasing capacity, new education and training programs in the field of Energy Sciences and Engineering are presently targeted in several high education institutions prior to the goals of the education and research national reform. The preparation of a new master and engineer diploma at ENIM 'Power Systems Engineering and Management' is in process: the curricula introduces innovative concepts bringing together academic teachers, researchers and stakeholders to establish new discipline-based teaching and learning tools: what is mainly focused is to increase competency profile in consultation with the industry sector and to attract high quality students to ensure availability of human resources at the right time in the field of power technology utilization including nuclear power. A coordinated approach joining national and international partnership to implement oriented R
Bouhelal, Oum Keltoum
In the area of Energy Engineering, high education programs including nuclear activities are currently running in collaboration with the employment sector to provide skills oriented profiles; the available packages are thus characterized by a limited size and a low impact in enhancing power technology teaching and industrial partnerships. However, ongoing nuclear applications activities are undertaken through strong legal and institutional infrastructures as Morocco has joined a large number of international conventions and agreements trusted by the IAEA. The introduction of nuclear power is subject to a close attention today to investigate if it is an alternative solution to meet the increasing energy needs. For a country not much industrialized and characterized by a medium electricity grid, the decision on the recourse to nuclear power needs to carry up early a training, R and D federative program on behalf of the engineering sector and the international cooperation. As the challenges associated to develop a successful nuclear power program requires an important effort directed toward increasing capacity, new education and training programs in the field of Energy Sciences and Engineering are presently targeted in several high education institutions prior to the goals of the education and research national reform. The preparation of a new master and engineer diploma at ENIM 'Power Systems Engineering and Management' is in process: the curricula introduces innovative concepts bringing together academic teachers, researchers and stakeholders to establish new discipline-based teaching and learning tools: what is mainly focused is to increase competency profile in consultation with the industry sector and to attract high quality students to ensure availability of human resources at the right time in the field of power technology utilization including nuclear power. A coordinated approach joining national and international partnership to implement oriented R and D
Jordan, C.W.; Cavitt, R.E.; Niven, W.A.; Warren, F.E.; Taylor, S.S.; Sharick, T.M.; Vickers, D.L.; Mitschkowetz, N.; Weaver, R.L.
Lawrence Livermore National Laboratory (LLNL) is piloting an Internet- based paperless process called `Zephyr` to streamline engineering procurements. Major benefits have accrued by using Zephyr in reducing procurement time, speeding the engineering development cycle, facilitating industrial collaboration, and reducing overall costs. Programs at LLNL are benefiting by the efficiencies introduced since implementing Zephyr`s engineering and commerce on the Internet.
ER D C/ EL C R- 16 -1 Ecosystem Management and Restoration Research Program Case Study Application of the Biodiversity Security Index... Biodiversity Security Index to Ranking Feasibility Studies for Ecosystem Restoration Projects of the U.S. Army Corps of Engineers Richard A. Cole... Biodiversity Security Index (BSI) was applied to 23 project sites ranked for restoration feasibility study annual funding by the U. S. Army Corps of
towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer
Hartney, C.; Banks, W.W.
The purpose of this study was to empirically determine which of several security hardware interface designs produced the highest levels of end-user performance and acceptance. The FESSP Security Alarms and Monitoring Systems program area commissioned the authors study as decision support for upgrading the Argus security system's primary user interface so that Argus equipment will support the new DOE and DoD security access badges. Twenty-two test subjects were repeatedly tested using six remote access panel (RAP) designs. Lawrence Livermore National Laboratory (LLNL) uses one of these interface designs in its security access booths. Along with the RAP B insert-style reader, the authors tested five prototype RAP variants, each with a different style of swipe badge reader, through which a badge is moved or swiped. The authors asked the untrained test subjects to use each RAP while they described how they thought they should respond so that the system would operate correctly in reading the magnetic strip on a security badge. With each RAP variant, subjects were required to make four successful card reads (swipes) in which the card reader correctly read and logged the transaction. After each trial, a subject completed a 10-item interface acceptance evaluation before approaching the next RAP. After interacting with the RAP interfaces (for a total of the six RAP trials), each subject completed a 7-item overview evaluation that compared and ranked the five experimental RAPs, using the original (RAP B) insert style as a standard
Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.
Objectives: The aim of the current study is to explore to what extent an intervention reduces the effects of social engineering (e.g. the obtaining of access by persuasion) in an office environment. In particular, we study the effect of authority during a `social engineering' attack. Methods: 31
The research reported here examined the engineer occupational course curricula presented by the South African Army School of Engineers. Methodology involved examination of all enabling learning objectives for the Corps Training Course (701 ENGR 006), the Troop Officers Course (701 ENGR 103), the Troop ...
Zelkin, Natalie; Henriksen, Stephen
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.
.... Especially worrisome are the following: (1) a general lack of interest among American-born youth in pursuing education in the physical sciences, mathematics, environmental sciences, and engineering at the undergraduate and graduate levels; (2...
Meyers, Frederick D.
Investigates the commonalities and differences of graphics programs among nine universities in the United States by analyzing the course structure and reviewing attendance and course syllabi. (Author/YDS)
Goslin, Kimberly G.
This article asserts that curricula, a living text, ought to take into consideration the virtues of fairness, justice, and integrity as found in law, in order to judge controversial issues of curriculum. This assertion is argued through a comparison of jurisprudence and pedagogy, as well as law and curricula. Dworkin's (1986) contention of "law as…
Perera, Chamila Roshani; Hewege, Chandana Rathnasiri
Purpose: The purpose of this study is to extend the current knowledge of curriculum developments in international business and marketing curricula. Integrating sustainability into business and marketing curricula of the universities are widely debated in previous literature. Sustainability is a global phenomenon; however, curriculum development…
This books presents the curricula necessary for sustainability in higher education. It shows how the learning process is transforming in order to promote sustainability. It prepares administrators, teachers and students to diffuse the development in the field, showing a curricula based on three interconnected pillars: the environment, the economic and the social aspects. It contains 8 chapters introducing research advances in the field.
Longenecker, Herbert E., Jr.; Feinstein, David; Clark, Jon D.
This article presents the results of research to explore the nature of changes in skills over a fifty year period spanning the life of Information Systems model curricula. Work begun in 1999 was expanded both backwards in time, as well as forwards to 2012 to define skills relevant to Information Systems curricula. The work in 1999 was based on job…
Vsevolod Petrovich Babushkin
Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given
Davinson, Donald; Roberts, Norman
Survey of constraints upon capacity for curriculum enrichment in schools of library and information studies in England and Wales reveals a lack of financial support with resources fixed to "historic costs." Discussion includes the effect on curricula, who's to blame for funding inadequacies, and strategies to secure adequate future…
Hepburn, Larry; Shin, Masako
This document, one of eight in a multi-cultural competency-based vocational/technical curricula series, is on automotive mechanics. This program is designed to run 36 weeks and cover 10 instructional areas: the engine; drive trains--rear ends/drive shafts/manual transmission; carburetor; emission; ignition/tune-up; charging and starting;…
Faucett, R.E.; Schow, F.L.
The study examines the economics and applicability of low and high pressure sodium sources in both streetlight and floodlight luminaires for CCTV illumination of high-security areas. In addition the signal outputs of several popular CCTV camera tube types operated in the presence of common lighting sources are calculated. These calculations take into consideration the spectral response of the camera tubes and the spectral output of the light sources. The results are presented in terms of dollars per unit camera signal strength and also camera signal strength per connected watt of electrical load
Pray, Carl; Ledermann, Samuel
In Africa and South Asia, where nutrition insecurity is severe, two of the most prominent production technologies are genetically modified (GM) crops and certified organic agriculture. We analyze the potential impact pathways from agricultural production to nutrition. Our review of data and the literature reveals increasing farm-level income from cash crop production as the main pathway by which organic agriculture and GM agriculture improve nutrition. Potential secondary pathways include reduced prices of important food crops like maize due to GM maize production and increased food production using organic technology. Potential tertiary pathways are improvements in health due to reduced insecticide use. Challenges to the technologies achieving their impact include the politics of GM agriculture and the certification costs of organic agriculture. Given the importance of agricultural production in addressing nutrition security, accentuated by the post-2015 sustainable development agenda, the chapter concludes by stressing the importance of private and public sector research in improving the productivity and adoption of both GM and organic crops. In addition, the chapter reminds readers that increased farm income and productivity require complementary investments in health, education, food access and women's empowerment to actually improve nutrition security. © 2016 S. Karger AG, Basel.
Leydens, Jon A
Using social justice as a catalyst for curricular transformation, Engineering Justice presents an examination of how politics, culture, and other social issues are inherent in the practice of engineering. It aims to align engineering curricula with socially just outcomes, increase enrollment among underrepresented groups, and lessen lingering gender, class, and ethnicity gaps by showing how the power of engineering knowledge can be explicitly harnessed to serve the underserved and address social inequalities. This book is meant to transform the way educators think about engineering curricula through creating or transforming existing courses to attract, retain, and motivate engineering students to become professionals who enact engineering for social justice. Engineering Justice offers thought-provoking chapters on: why social justice is inherent yet often invisible in engineering education and practice; engineering design for social justice; social justice in the engineering sciences; social justice in human...
Mathematical methods and theories with interdisciplinary applications are presented in this book. The eighteen contributions presented in this Work have been written by eminent scientists; a few papers are based on talks which took place at the International Conference at the Hellenic Artillery School in May 2015. Each paper evaluates possible solutions to long-standing problems such as the solvability of the direct electromagnetic scattering problem, geometric approaches to cyber security, ellipsoid targeting with overlap, non-equilibrium solutions of dynamic networks, measuring ballistic dispersion, elliptic regularity theory for the numerical solution of variational problems, approximation theory for polynomials on the real line and the unit circle, complementarity and variational inequalities in electronics, new two-slope parameterized achievement scalarizing functions for nonlinear multiobjective optimization, and strong and weak convexity of closed sets in a Hilbert space. Graduate students, scientists,...
Tao, Yang; Linghao, Zhu; Xi, Tan; Junyu, Wang; Lirong, Zheng; Hao, Min
An ultra-high-frequency (UHF) radio frequency identification (RFID) secure tag chip with a non-crypto mode and a crypto mode is presented. During the supply chain management, the tag works in the non-crypto mode in which the on-chip crypto engine is not enabled and the tag chip has a sensitivity of -12.8 dBm for long range communication. At the point of sales (POS), the tag will be switched to the crypto mode in order to protect the privacy of customers. In the crypto mode, an advanced encryption standard (AES) crypto engine is enabled and the sensitivity of the tag chip is switched to +2 dBm for short range communication, which is a method of physical protection. The tag chip is implemented and verified in a standard 0.13-μm CMOS process. Project supported by the National Science & Technology Pillar Program of China (No. 2015BAK36B01).
Vasile-Daniel CARDOȘ; Ildikó Réka CARDOȘ
Financial and internal auditors must cope with the challenge of performing their mission in technology enhanced environment. In this article we match the information technology description found in the International Federation of Accountants (IFAC) and the Institute of Internal Auditors (IIA) curricula against the Model Curriculum issued by the Information Systems Audit and Control Association (ISACA). By reviewing these three curricula, we matched the content in the ISACA Model Curriculum wi...
With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…
The importance of railway transport has long been recognized. However, no railway : engineering courses have been provided in the UTK civil engineering curricula. The : objective of this education project is to develop some railway engineering module...
Full Text Available In the last twenty years nanotechnology hasrevolutionized the world of information theory, computers andother important disciplines, such as medicine, where it hascontributed significantly in the creation of more sophisticateddiagnostic tools. Therefore, it is important for people working innanotechnology to better understand basic concepts to be morecreative and productive. To further foster the progress onNanotechnology in the USA, the National Science Foundation hascreated the Network for Computational Nanotechnology (NCNand the dissemination of all the information from member andnon-member participants of the NCN is enabled by thecommunity website www.nanoHUB.org. nanoHUB’s signatureservices online simulation that enables the operation ofsophisticated research and educational simulation engines with acommon browser. No software installation or local computingpower is needed. The simulation tools as well as nano-conceptsare augmented by educational materials, assignments, and toolbasedcurricula, which are assemblies of tools that help studentsexcel in a particular area.As elaborated later in the text, it is the visual mode of learningthat we are exploiting in achieving faster and better results withstudents that go through simulation tool-based curricula. Thereare several tool based curricula already developed on thenanoHUB and undergoing further development, out of which fiveare directly related to nanoelectronics. They are: ABACUS –device simulation module; ACUTE – Computational Electronicsmodule; ANTSY – bending toolkit; and AQME – quantummechanics module. The methodology behind tool-based curriculais discussed in details. Then, the current status of each module ispresented, including user statistics and student learningindicatives. Particular simulation tool is explored further todemonstrate the ease by which students can grasp information.Representative of Abacus is PN-Junction Lab; representative ofAQME is PCPBT tool; and
BÉLA ILLÉS; GABRIELLA BOGNÁR
Mathematics is a crucial language in all engineering courses and researches where mathematical modeling, simulation and manipulation are commonly used. Engineering Mathematics courses are considered difficult courses in engineering curricula. This is reflected in engineering students’ performance at the end of each semester for these courses. Our goal is to overview a few questions on mathematics as a core subject of engineering.
Eriksen, Jesper G.; Beavis, Andrew W.; Coffey, Mary A.; Leer, Jan Willem H.; Magrini, Stefano M.; Benstead, Kim; Boelling, Tobias; Hjälm-Eriksson, Marie; Kantor, Guy; Maciejewski, Boguslaw; Mezeckis, Maris; Oliveira, Angelo; Thirion, Pierre; Vitek, Pavel
Introduction: In 2007 ESTRO proposed a revision and harmonisation of the core curricula for radiation oncologists, medical physicists and RTTs to encourage harmonised education programmes for the professional disciplines, to facilitate mobility between EU member states, to reflect the rapid development of the professions and to secure the best evidence-based education across Europe. Material and methods: Working parties for each core curriculum were established and included a broad representation with geographic spread and different experience with education from the ESTRO Educational Committee, local representatives appointed by the National Societies and support from ESTRO staff. Results: The revised curricula have been presented for the ESTRO community and endorsement is ongoing. All three curricula have been changed to competency based education and training, teaching methodology and assessment and include the recent introduction of the new dose planning and delivery techniques and the integration of drugs and radiation. The curricula can be downloaded at (http://www.estro-education.org/europeantraining/Pages/EuropeanCurricula.aspx). Conclusion: The main objective of the ESTRO core curricula is to update and harmonise training of the radiation oncologists, medical physicists and RTTs in Europe. It is recommended that the authorities in charge of the respective training programmes throughout Europe harmonise their own curricula according to the common framework.
Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan
The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.
Berg, Melanie; Label, Kenneth
The United States government has identified that application specific integrated circuit (ASIC) and field programmable gate array (FPGA) hardware are at risk from a variety of adversary attacks. This finding affects system security and trust. Consequently, processes are being developed for system mitigation and countermeasure application. The scope of this tutorial pertains to potential vulnerabilities and countermeasures within the ASIC/FPGA design cycle. The presentation demonstrates how design practices can affect the risk for the adversary to: change circuitry, steal intellectual property, and listen to data operations. An important portion of the design cycle is assuring the design is working as specified or as expected. This is accomplished by exhaustive testing of the target design. Alternatively, it has been shown that well established schemes for test coverage enhancement (design-for-verification (DFV) and design-for-test (DFT)) can create conduits for adversary accessibility. As a result, it is essential to perform a trade between robust test coverage versus reliable design implementation. The goal of this tutorial is to explain the evolution of design practices; review adversary accessibility points due to DFV and DFT circuitry insertion (back door circuitry); and to describe common engineering trade-off considerations for test versus adversary threats.
El-Bawab, Abd El-Monem A
If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.
Hazelton, James; Haigh, Matthew
. The first author introduced sustainability-related material into a core technical accounting unit and created an elective unit. The second author participated with students to evaluate critically social reports of employers, current and potential. In terms of an objective of bringing reflexivity......This paper chronicles the journey of two projects that sought to incorporate principles of sustainable development into predominantly technical postgraduate accounting curricula. The design and delivery of the projects were informed by Freirian principles of praxis and critical empowerment...... as vocational skills) add to the difficulties for sustainability in penetrating already overcrowded curricula....
Jevremovic, Tatjana; Choe, Dongok; Yang, Haori; White, Sally; Kelly, Mike
The safety culture involving a comprehensive training of the employed engineers at the power plant facilities is neither a simple nor a straightforward task. With aging management and operators, impact of the Fukushima nuclear event, unforeseen and timely unpredictable effects of nuclear memories (Three Mile Island, Chernobyl, Second World War) as evoked every time we have worldwide challenges or discussions of where the nuclear technology will/would further develop, we face a fearful question - is our educational and training approach the right one; is it going to assure continuous and secured practices in providing safe operation of our nuclear power plants?... We at the University of Utah with our just recently revitalized Nuclear Engineering Program, find that the root of securing the safety culture and providing its sustainability in our existing and future nuclear power plants, lies in very early educational practices. We believe that every program in nuclear engineering education shall include training in nuclear safety. That training shall certainly include industrial based practices and involve experts from the companies that develop and contribute to nuclear power safety to add to class practices at the University teaching settings. Working with DevonWay, a leading company in developing software to improve the safety cultures at nuclear power plants in the country, we have implemented the 'Track and Trace' software into our nuclear engineering program, emphasizing high quality training of our undergraduate and graduate students, and promoting a higher level safety culture practices at our nuclear engineering facilities. (author)
Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis...DoD Identity Management Capability Enterprise Services Application (IMESA) Access to FBI National Crime Information Center (NCIC) Files,” April 22...Coordinates with: (1) The USD(I) for oversight and maintenance responsibilities, and for changes to digital DoD personnel identity data and
Henderson, S. M.
Describes the field of bioengineering with particular emphasis on agricultural engineering, and presents the results of a survey of schools that combine biology and engineering in their curricula. (JR)
Carlson, Helen L.
A survey of secondary students after they had completed a course entitled "Security in the Nuclear Age" suggests that instruction can make some impact in the area of security information. However, results also showed that students use media rather than school as information sources. Peace curricula are also discussed. (RM)
Garneau, Christopher J; Parkinson, Matthew B
The size and shape of users are an important consideration for many products and environments. Designers and engineers in many disciplines must often accommodate these attributes to meet objectives such as fit and safety. When practitioners have academic training in addressing these issues, it is typically through courses in Human Factors/Ergonomics (HF/E). This paper investigates education related to physical accommodation and offers suggestions for improvement. A survey was conducted wherein 21 instructors at 18 universities in the United States provided syllabi for 29 courses, which were analysed to determine topics related to anthropometry and resources used for the courses. The results show that within the U.S., anthropometry is covered in the majority of courses discussing physical ergonomics, but important related concepts were often omitted (e.g., digital human modelling, multivariate accommodation and variability across global populations). Curricula could be improved by incorporating more accurate anthropometry, multivariate problems and interactive online tools. This paper describes a study investigating collegiate ergonomics courses within the U.S. in the area of physical accommodation. Course schedules and texts were studied for their treatment of several topics related to accommodating the spatial requirements (anthropometry) of users. Recommendations are made for improving course curricula.
Greene, Anna C; Giffin, Kristine A; Greene, Casey S; Moore, Jason H
Modern technologies are capable of generating enormous amounts of data that measure complex biological systems. Computational biologists and bioinformatics scientists are increasingly being asked to use these data to reveal key systems-level properties. We review the extent to which curricula are changing in the era of big data. We identify key competencies that scientists dealing with big data are expected to possess across fields, and we use this information to propose courses to meet these growing needs. While bioinformatics programs have traditionally trained students in data-intensive science, we identify areas of particular biological, computational and statistical emphasis important for this era that can be incorporated into existing curricula. For each area, we propose a course structured around these topics, which can be adapted in whole or in parts into existing curricula. In summary, specific challenges associated with big data provide an important opportunity to update existing curricula, but we do not foresee a wholesale redesign of bioinformatics training programs. © The Author 2015. Published by Oxford University Press.
Boyd, Linda D.; Fun, Kay; Madden, Theresa E.
Two hours of tobacco instructions were incorporated into the baccalaureate dental hygiene curricula in a university in the Northwestern United States. Prior to graduation, all senior students were invited to complete anonymously a questionnaire surveying attitudes and clinical skills in providing tobacco services to their clinic patients. Twenty…
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Koester, Jolene; Lustig, Myron W.
Argues in favor of developing and adapting curricula with a multicultural perspective. Presents typical problems facing students who are outside their cultural context. Describes the dominance of a United States Anglo perspective in communication skills, theory, and methods courses. Offers five suggestions for developing multicultural…
Taiwanese textbooks play a central role in Taiwanese education. In the wake of the political reform and social protest movements of the 1970s and 1980s that prompted Taiwanese educational reform, critics have charged that traditional curricula tend to reinforce the dominant national Chinese cultural identity. The purpose of this article is to…
McHaney, Roger; Martin, Dawne
This paper provides several suggestions Hispanic student recruitment and retention in MIS or other business curricula. Cultural considerations like allocentrism and familialism are discussed along with the situation at K-State. It is believed that the recruitment and retention of Hispanic students can be influenced positively by considering…
American Psychologist, 2013
The "National Standards for High School Psychology Curricula" attempts to represent current knowledge in the field of psychology in developmentally appropriate ways. Psychology is a popular high school course, one that can introduce students to scientific ideas and engage students in the learning process. However, it is difficult for even the best…
Greene, Anna C.; Giffin, Kristine A.; Greene, Casey S.
Modern technologies are capable of generating enormous amounts of data that measure complex biological systems. Computational biologists and bioinformatics scientists are increasingly being asked to use these data to reveal key systems-level properties. We review the extent to which curricula are changing in the era of big data. We identify key competencies that scientists dealing with big data are expected to possess across fields, and we use this information to propose courses to meet these growing needs. While bioinformatics programs have traditionally trained students in data-intensive science, we identify areas of particular biological, computational and statistical emphasis important for this era that can be incorporated into existing curricula. For each area, we propose a course structured around these topics, which can be adapted in whole or in parts into existing curricula. In summary, specific challenges associated with big data provide an important opportunity to update existing curricula, but we do not foresee a wholesale redesign of bioinformatics training programs. PMID:25829469
Ahn, Mark J.; Ettner, Larry
Purpose: The purpose of this paper is to investigate the role of cultural intelligence in MBA curricula. Shaping global corporate culture that manifests itself in powerful-shared values, group behavior, and persists despite changes in-group membership is decisive to organizational performance. In turn, cultural intelligence (CQ), defined, as an…
aircraft. The backend database affords the storage of a variety of relevant hardware information. For example, the database could be expanded to...to query for this information, but with an empty database these elements are currently nonfunctional. The Django backend handling the routing of...expanding our design into the mobile market, allowing the cyber commander to monitor aircraft status on a tablet device such as an Apple iPad. We imagine
Stodden, Robert A.; Galloway, L. M.; Stodden, Norma Jean
This article examines the complex needs of students with disabilities in learning rigorous standards-based curricula, the need of educators to teach this population standards-based curricula effectively, and the contextual factors that affect teaching and learning standards-based curricula in secondary schools. Exemplary and promising practices…
Yumusak, Güngör Keskinkiliç
One of the most important objectives of the science curricula is to bring in science process skills. The science process skills are skills that lie under scientific thinking and decision-making. Thus it is important for a science curricula to be rationalized in such a way that it brings in science process skills. New science curricula were…
Compagna, L.; El Khoury, P.; Krausová, A.; Massacci, F.; Zannone, N.
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address
Full Text Available E-tourism and hospitality represents the development of tourism and hospitality to integrate ICT tools and has significantly changed the industry over the last decade. In order to meet the new needs, knowledge service suppliers (i.e. the university must meet the requirements and social developments of the tourism industry. The quality of e-tourism and hospitality curriculum depends largely on the education quality and its subsequent implementation. The research reveals that higher education is not currently meeting the needs of the industry, especially in the Greater Mekong Sub-region countries. This article focuses on two major problems, which represent a disparity between the knowledge needs of the tourism and hospitality industry and the knowledge provided by curricula in higher education. The authors leverage a knowledge engineering perspective so as to bridge the gap between knowledge demand and supply as related to e-tourism and hospitality curriculum design.
Du, Wenliang; Wang, Ronghua
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
This article presents a concise reliability analysis of network security abstracted from stochastic modeling, reliability, and queuing theories. Network security analysis is composed of threats, their impacts, and recovery of the failed systems. A unique framework with a collection of the key reliability models is presented here to guide the determination of the system reliability based on the strength of malicious acts and performance of the recovery processes. A unique model, called Attack-obstacle model, is also proposed here for analyzing systems with immunity growth features. Most computer science curricula do not contain courses in reliability modeling applicable to different areas of computer engineering. Hence, the topic of reliability analysis is often too diffuse to most computer engineers and researchers dealing with network security. This work is thus aimed at shedding some light on this issue, which can be useful in identifying models, their assumptions and practical parameters for estimating the reliability of threatened systems and for assessing the performance of recovery facilities. It can also be useful for the classification of processes and states regarding the reliability of information systems. Systems with stochastic behaviors undergoing queue operations and random state transitions can also benefit from the approaches presented here. - Highlights: • A concise survey and tutorial in model-based reliability analysis applicable to information security. • A framework of key modeling approaches for assessing reliability of networked systems. • The framework facilitates quantitative risk assessment tasks guided by stochastic modeling and queuing theory. • Evaluation of approaches and models for modeling threats, failures, impacts, and recovery analysis of information systems
Full Text Available Financial and internal auditors must cope with the challenge of performing their mission in technology enhanced environment. In this article we match the information technology description found in the International Federation of Accountants (IFAC and the Institute of Internal Auditors (IIA curricula against the Model Curriculum issued by the Information Systems Audit and Control Association (ISACA. By reviewing these three curricula, we matched the content in the ISACA Model Curriculum with the IFAC International Education Practice Statement 2 and the IIAs’ Global Model Internal Audit Curriculum. In the IFAC and IIA Curriculum there are 16 content elements, out of 19 possible, which match, in their description, the ISACA Model Curriculum’s content. We noticed that a candidate who graduates an IFAC or IIA compliant program acquire IS auditing competences similar to the specific content of the ISACA model curriculum but less than the requirements for a professional information systems auditor.
Kainberger, F.; Kletter, K.
Pregraduate medical curricula are currently undergoing a reform process that is moving away from a traditional discipline-related structure and towards problem-based integrated forms of teaching. Imaging sciences, with their inherently technical advances, are specifically influenced by the effects of paradigm shifts in medical education. The teaching of diagnostic radiology should be based on the definition of three core competencies: in vivo visualization of normal and abnormal morphology and function, diagnostic reasoning, and interventional treatment. On the basis of these goals, adequate teaching methods and e-learning tools should be implemented by focusing on case-based teaching. Teaching materials used in the fields of normal anatomy, pathology, and clinical diagnosis may help diagnostic radiology to play a central role in modern pregraduate curricula. (orig.)
Kainberger, F; Kletter, K
Pregraduate medical curricula are currently undergoing a reform process that is moving away from a traditional discipline-related structure and towards problem-based integrated forms of teaching. Imaging sciences, with their inherently technical advances, are specifically influenced by the effects of paradigm shifts in medical education. The teaching of diagnostic radiology should be based on the definition of three core competencies: in vivo visualization of normal and abnormal morphology and function, diagnostic reasoning, and interventional treatment. On the basis of these goals, adequate teaching methods and e-learning tools should be implemented by focusing on case-based teaching. Teaching materials used in the fields of normal anatomy, pathology, and clinical diagnosis may help diagnostic radiology to play a central role in modern pregraduate curricula.
Teixeira, Jose Carlos Fernandes; da Silva, Jaime Ferreira; Flores, Paulo
The implementation of the Bologna protocol in the European Union has set new goals for the whole higher education system as: (a) a quality assessment for university courses; (b) a framework for the exchange of students and academics; and (c) an opportunity for changing the teaching/learning procedures and methodologies. Within the context, the…
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
An important activity of the International Atomic Energy Agency is the promotion of training in radiological protection. Through its organized training courses, its fellowship training programme and its field experts, the Agency has assisted many Member States to train an essential group of scientists in radiological protection. Many Member States are now developing their own national training programmes in radiological protection and this report has been prepared to provide the guidance that may be required in this development. In the report the various types of training which are encountered in a radiological protection programme are fully discussed, curricula are suggested and examples of established training courses are annexed
Brandon, Amy F; All, Anita C
Today's nursing programs are struggling to accommodate the changing needs of the health care environment and need to make changes in how students are taught. Using constructivism theory, whereby learning is an active process in which learners construct new ideas or concepts based upon their current or past knowledge, leaders in nursing education can make a paradigm shift toward concept-based curricula. This article presents a summary and analysis of constructivism and an innovative application of its active-learning principles to curriculum development, specifically for the education of nursing students.
Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.
Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.
Mississippi State Dept. of Education, Jackson. Office of Vocational, Technical and Adult Education.
Standardized curricula are provided for two courses for the secondary vocational education program in Mississippi: diesel engine mechanics I and II. The eight units in diesel engine mechanics I are as follows: orientation; shop safety; basic shop tools; fasteners; measurement; engine operating principles; engine components; and basic auxiliary…
Murthy , Narayan
Part 2: WISE 7; International audience; To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and graduate curricula. Our department has introduced computer security courses at both the undergraduate and the graduate level. This paper describes our approach, our experiences, and lessons learned in teaching a Computer Security Overview course.There are two key elements in the course: Studying comput...
The flexible and modular design of the engine allows a broad spectrum of applications, ranging from high-end enterprise level network devices that need to match hundreds of thousands of patterns at speeds of tens of gigabits per second, to low-end dev...
Lee, B. Brian; Lee, Jungsun
The authors examined an association between mathematical content in college-level curricula and beginning salaries of graduating students on the basis of data collected from a public university in the southern region of the United States. The authors classified the mathematical content requirements of the curricula into the following 5 groups…
Lamb, Sharon; Lustig, Kara; Graling, Kelly
Since Michelle Fine's writing on the missing discourse of desire in sex education, there has been considerable prompting among sexuality educators and feminist scholars to incorporate talk of pleasure into sex education curricula. While the calls for inclusion continue, few have actually examined the curricula for a pleasure discourse or…
Due to European agreements and policy expectations, national authorities are revising their formal curricula in line with an evidence-oriented policy. The article explores how new trends in formulating curricula can be regarded as an outcome of experts' semantics and impact on education policy. The article reanalyses documentation from a project,…
Discusses how information architecture is being handled in some library and information science (LIS) programs and suggests mappings between traditional LIS curricula and the marketplace for information architects. Topics include terminology used in LIS curricula; current job opportunities; and projections for the future. (LRW)
Biasutti, Michele; Makrakis, Vassilios; Concina, Eleonora; Frate, Sara
Purpose: The purpose of this paper is to present a professional development experience for higher education academic staff within the framework of an international Tempus project focused on reorienting university curricula to address sustainability. The project included revising curricula to phase sustainable development principles into university…
The National Standards for High School Psychology Curricula attempts to represent current knowledge in the field of psychology in developmentally appropriate ways. Psychology is a popular high school course, one that can introduce students to scientific ideas and engage students in the learning process. However, it is difficult for even the best of teachers to present all of psychology in a single course for students who begin with virtually no formal knowledge of psychology. The standards presented here constitute the first of two reports in this issue of the American Psychologist (January 2013) representing recent American Psychological Association (APA) policies that support high-quality instruction in the teaching of high school psychology. These standards provide curricular benchmarks for student learning in the high school course.
Full Text Available Objective To explores nursing faculty members’ attitudes towards older people, their thoughts about gerontological nursing education. Method Five focus groups and a survey were used with nursing faculty members 132 at the three nursing schools to explore their attitudes towards the care of older people and the perceived status of gerontological nursing education. The survey was given to 132 faculty members, including 76 clinical instructors, 40 associate professors and 16 professors. The nursing faculty in general had a positive attitude toward older people (M=3.36, SD 0.25, and teachers’ attitudes were higher than those of their nursing students (M=3.18, SD0.29. Results This study results suggests that Saudi nursing curricula should include more extensive gerontology content and clinical experience with older people. Conclusion This is the first time in Saudi Arabia that research has listened to their voices and examined their commitments toward gerontology education.
Barzilay, O.; Hazzan, O.; Yehudai, A.
Software engineering (SE) is a multidimensional field that involves activities in various areas and disciplines, such as computer science, project management, and system engineering. Though modern SE curricula include designated courses that address these various subjects, an advanced summary course that synthesizes them is still missing. Such a…
Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...
Hauschild, Michael Zwicky; Alting, Leo; Molin, Christine
, Bruxelles (Belgium). Department of Manufacturing Engineering and Management hosted a mini-tutorial on Courses and Curricula in Sustainable Development and Environmental Management at the Technical University of Denmark. The procedings comprise papers from universities and institutions in many countries...
Sparks, D. W.; Ewing, R. C.; Fowler, D.; Macik, M.; Marcantonio, F.; Miller, B.; Newman, J.; Olszewski, T.; Reece, R.; Rosser, S.
In the summer of 2014, the Texas A&M Department of Geology and Geophysics partnered with the Texas A&M Center for Teaching Excellence to implement TAMU's curriculum revision process: a data-informed, faculty-driven, educational-developer-supported rebuilding of our degree programs and course offerings. The current curricula (B.S. and B.A. in Geology, B.S. in Geophysics) were put into place in 1997, following the merger of two separate departments. The needs and capabilities of the Department and the student body have changed significantly since that time: more than 50% turnover of the faculty, a rapidly-changing job climate for geologists and geophysicists, and a nearly five-fold increase in the undergraduate population to over 500 majors in Fall 2015. Surveys of former students, employers and faculty at other universities revealed more reasons to address the curriculum. Some of the most desired skills are also those at which our graduates feel and are perceived to be least prepared: oral communication and the ability to learn software packages (skills that are most challenging to teach with growing class sizes). The challenge facing the Department is to accommodate growing student numbers while maintaining strength in traditional instructor-intensive activities such as microscopy and field mapping, and also improving our graduates' non-geological skills (e.g., communication, software use, teamwork, problem-solving) to insulate them from volatility in the current job market. We formed the Curriculum Study Group, consisting of faculty, graduate students, advisors and curriculum experts, to gather and analyze data and define the knowledge and skill base a graduate of our department must have. In addition to conducting external surveys, this group interviewed current students and faculty to determine the strengths and weaknesses of our program. We developed program learning goals that were further specified into over fifty criteria. For each criteria we defined
The Guidebook contains detailed information on curricula which would provide the professional technical education qualifications which have been established for nuclear power programme personnel. The core of the Guidebook consists of model curricula in engineering and science, including relevant practical work. Curricula are provided for specialization, undergraduate, and postgraduate programmes in nuclear-oriented mechanical, chemical, electrical, and electronics engineering, as well as nuclear engineering and radiation health physics. Basic nuclear science and engineering laboratory work is presented together with a list of basic experiments and the nuclear equipment needed to perform them. Useful measures for implementing and improving engineering and science education and training capabilities for nuclear power personnel are presented. Valuable information on the national experiences of IAEA Member States in engineering and science education for nuclear power, as well as examples of such education from various Member States, have been included
Kilicay-Ergin, N.; Laplante, P. A.
Requirements engineering is one of the fundamental knowledge areas in software and systems engineering graduate curricula. Recent changes in educational delivery and student demographics have created new challenges for requirements engineering education. In particular, there is an increasing demand for online education for working professionals.…
McFarland Kendall, Amber Leigh
K-12 standards and curricula are beginning to include engineering design as a key practice within Science Technology Engineering and Mathematics (STEM) education. However, there is little research on how the youngest students engage in engineering design within the elementary classroom. This dissertation focuses on iteration as an essential aspect…
Full Text Available The aim of the programs in Computer Science is to educate and train students to understand the problems and build systems that solve them. This process involves applying a special reasoning to model interactions, capabilities, and limitations of the components involved. A good curriculum must involve the use of tools to assist in these tasks, and one that could be considered as a fundamental is the logic, because with it students develop the necessary reasoning. Besides, software developers analyze the behavior of the program during the designed, the depuration, and testing; hardware designers perform minimization and equivalence verification of circuits; designers of operating systems validate routing protocols, programing, and synchronization; and formal logic underlying all these activities. Therefore, a strong background in applied logic would help students to develop or potentiate their ability to reason about complex systems. Unfortunately, few curricula formed and properly trained in logic. Most includes only one or two courses of Discrete Mathematics, which in a few weeks covered truth tables and the propositional calculus, and nothing more. This is not enough, and higher level courses in which they are applied and many other logical concepts are needed. In addition, students will not see the importance of logic in their careers and need to modify the curriculum committees or adapt the curriculum to reverse this situation.
This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview
Cervero, Ronald M.; Daley, Barbara J.
This chapter provides an overview of the emerging social and organizational contexts for health professions education and the rationale for foundational adult and continuing education concepts to be included in the curricula of HPE graduate programs.
Jos Walenkamp; Joyce den Heijer; Anneke Schuurmans-Brouwer; A. (Andreas) Funk
Internationalizing curricula. Needs and wishes of alumni and employers with regard to international competencies. Internationalization has become of great importance for universities acrossthe globe. The labour market is becoming international, with internationalopportunities and international
Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.
Landsfeld, M. F.; Daudert, B.; Friedrichs, M.; Morton, C.; Hegewisch, K.; Husak, G. J.; Funk, C. C.; Peterson, P.; Huntington, J. L.; Abatzoglou, J. T.; Verdin, J. P.; Williams, E. L.
The Famine Early Warning Systems Network (FEWS NET) focuses on food insecurity in developing nations and provides objective, evidence based analysis to help government decision-makers and relief agencies plan for and respond to humanitarian emergencies. The Google Earth Engine (GEE) is a platform provided by Google Inc. to support scientific research and analysis of environmental data in their cloud environment. The intent is to allow scientists and independent researchers to mine massive collections of environmental data and leverage Google's vast computational resources to detect changes and monitor the Earth's surface and climate. GEE hosts an enormous amount of satellite imagery and climate archives, one of which is the Climate Hazards Group Infrared Precipitation with Stations dataset (CHIRPS). The CHIRPS dataset is land based, quasi-global (latitude 50N-50S), 0.05 degree resolution, and has a relatively long term period of record (1981-present). CHIRPS is on a continuous monthly feed into the GEE as new data fields are generated each month. This precipitation dataset is a key input for FEWS NET monitoring and forecasting efforts. FEWS NET intends to leverage the GEE in order to provide analysts and scientists with flexible, interactive tools to aid in their monitoring and research efforts. These scientists often work in bandwidth limited regions, so lightweight Internet tools and services that bypass the need for downloading massive datasets to analyze them, are preferred for their work. The GEE provides just this type of service. We present a tool designed specifically for FEWS NET scientists to be utilized interactively for investigating and monitoring for agro-climatological issues. We are able to utilize the enormous GEE computing power to generate on-the-fly statistics to calculate precipitation anomalies, z-scores, percentiles and band ratios, and allow the user to interactively select custom areas for statistical time series comparisons and predictions.
First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan
Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas
In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an o...
What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...
Hamed M. Almalki; Luis Rabelo; Charles Davis; Hammad Usmani; Debra Hollister; Alfonso Sarmiento
Purpose: Studying and analyzing the undergraduate engineering students' leadership skills to discover their potential leadership strengths and weaknesses. This study will unveil potential ways to enhance the ways we teach engineering leadership. The research has great insights that might assist engineering programs to improve curricula for the purpose of better engineering preparation to meet industry's demands. Methodology and Findings: 441 undergraduate engineering students have been s...
The Information Engineering thrust area develops information technology to support the programmatic needs of Lawrence Livermore National Laboratory`s Engineering Directorate. Progress in five programmatic areas are described in separate reports contained herein. These are entitled Three-dimensional Object Creation, Manipulation, and Transport, Zephyr:A Secure Internet-Based Process to Streamline Engineering Procurements, Subcarrier Multiplexing: Optical Network Demonstrations, Parallel Optical Interconnect Technology Demonstration, and Intelligent Automation Architecture.
EVANGELIA N. SOSSIDOU
Full Text Available The aim of the present study is to analyze virtual learning environments and to provide a framework for assuring quality in farm animal welfare curricula. The framework is constructed according to the experimental learning for a case study developed in the context of the Leonardo da Vinci Community Vocational Training Action Pilot Project entitled “WELFOOD-Promoting quality assurance in animal welfare-environment-food quality interaction studies through upgraded e-Learning”. WELFOOD addressed objectives such as improvement and competencies of the skills in vocational training to promote employability and facilitate integration and reintegration in terms of capabilities and knowledge, needed for improved technologies in animal husbandry and food industry.
Lagos, L. [Applied Research Center, Florida International University, 10555 West Flagler Street, Suite 2100, Miami FL 33174 (United States)
presentations given at WM. The DOE Fellows participation at WM has resulted in three Best Student Poster Awards (WM09, WM10, and WM11) and one Best Professional Poster Award (WM09). DOE Fellows have also presented their research at ANS DD and R and ANS Robotics Topical meetings. Moreover, several of our DOE Fellows have already obtained employment with DOE-EM, other federal agencies, DOE contractors. This paper will discuss how DOE Fellows program is training and mentoring FIU STEM students in Department of Energy's Office of Environmental Management technical challenges and research. This training and mentoring has resulted in the development of well trained and polished young scientists and engineers that will become the future workforce in charge of carrying on DOE-EM's environmental cleanup mission. The paper will showcase FIU's DOE Fellows model and highlight some of the applied research the DOE Fellows have conducted at FIU's Applied Research Center and across the Complex by participating in summer internship assignments. This paper will also present and highlight other Fellowships and internships programs sponsored by National Nuclear Security Agency (NNSA), DOE-EM, NRC, Energy (NE), and other federal agencies targeting workforce development. (authors)
participation at WM has resulted in three Best Student Poster Awards (WM09, WM10, and WM11) and one Best Professional Poster Award (WM09). DOE Fellows have also presented their research at ANS DD and R and ANS Robotics Topical meetings. Moreover, several of our DOE Fellows have already obtained employment with DOE-EM, other federal agencies, DOE contractors. This paper will discuss how DOE Fellows program is training and mentoring FIU STEM students in Department of Energy's Office of Environmental Management technical challenges and research. This training and mentoring has resulted in the development of well trained and polished young scientists and engineers that will become the future workforce in charge of carrying on DOE-EM's environmental cleanup mission. The paper will showcase FIU's DOE Fellows model and highlight some of the applied research the DOE Fellows have conducted at FIU's Applied Research Center and across the Complex by participating in summer internship assignments. This paper will also present and highlight other Fellowships and internships programs sponsored by National Nuclear Security Agency (NNSA), DOE-EM, NRC, Energy (NE), and other federal agencies targeting workforce development. (authors)
Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.
De Patta, Joe
Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…
Irvine, Cynthia; Orman, Hilarie
Taken from the NPS website. The security of information systems and networks is a growing concern. Experts are needed to design and organize the protection mechanisms for these systems. Both government and industry increasingly seek individuals with knowledge and skills in computer security. In the past, most traditional computer science curricula bypassed formal studies in computer security altogether. An understanding of computer security was achieved largely through on-the-job ...
In this paper I introduce the contributions to a special section of the journal: one devoted to the question of how engineering curricula can or should contribute to the preparation of graduates for socially responsible decision making and conduct. The special section is motivated by the circumstance that, although there is broad agreement that…
Rodriguez-Andara, Alejandro; Río-Belver, Rosa María; Rodríguez-Salvador, Marisela; Lezama-Nicolás, René
Purpose: The purpose of this paper is to deliver a roadmap that displays pathways to develop sustainability skills in the engineering curricula. Design/methodology/approach: The selected approach to enrich engineering students with sustainability skills was active learning methodologies. First, a survey was carried out on a sample of 189 students…
The Springer Reference Work Handbook of Manufacturing Engineering and Technology provides overviews and in-depth and authoritative analyses on the basic and cutting-edge manufacturing technologies and sciences across a broad spectrum of areas. These topics are commonly encountered in industries as well as in academia. Manufacturing engineering curricula across universities are now essential topics covered in major universities worldwide.
Galanina, E.; Dulzon, A.; Schwab, A.
The aim of the present research is to discuss Tomsk Polytechnic University in respect of forming engineers’ sociocultural competence and teaching engineering ethics. Today international standards of training engineers cover efficient communication skills, ability to understand societal and environment context, professional and ethical responsibility. This article deals with the problem of contradiction between the need to form engineers’ sociocultural competence in Russian higher education institutions in order to meet the requirements of international accreditation organizations and the real capabilities of existing engineering curricula. We have described ethics teaching experience of TPU, studied the engineering master programs of TPU to see how the planned results are achieved. We have also given our recommendations to alter the structure of TPU educational curricula, which can also be applied in other higher education institutions.
Wakeland, Robin Gay
Visual and plastic arts in contemporary literacy instruction equal null curricula. Studies show that painting and sculpture facilitate teaching reading and writing (literacy), yet such pedagogy has not been formally adopted into USA curriculum. An example of null curriculum can be found in late 19th - early 20th century education the USA…
The benefit of introducing audit software into curricula for computer auditing students: a student perspective from the University of Pretoria. ... willing to sacrifice more of their time for practical computer classes because they are aware of the beneficial impact on their understanding of the subject as well as their future careers.
Bijker, Monique; Van der Klink, Marcel; Boshuizen, Els
Bijker, M. M., Van der Klink, M. R., & Boshuizen, H. P. A. (2010, 25-27 August). Success factors of master of science curricula in business administration. Paper presented at the 5th EARLI-SIG14, Learning and Professional Development, Munich, Germany.
Whalon, Constance; Karr-Kidwell, PJ
A multicultural framework for school curricula directed toward the culturally different was developed for implementation of court ordered multicultural education goals at the H. S. Thompson Learning Center of the Dallas (Texas) Independent School District. The philosophy of multicultural education suggests that ethnic diversity and cultural…
Star, Jon R.; Herbel-Eisenmann, Beth A.; Smith, John P., III
Examines 8th grade units from the Connected Mathematics Project (CMP). Identifies differences in older and newer conceptions, fundamental objects of study, typical problems, and typical solution methods in algebra. Also discusses where the issue of what is new in algebra is relevant to many other innovative middle school curricula. (KHR)
England, A.; Azevedo, K.B.; Bezzina, P.; Henner, A.; McNulty, J.P.
Purpose: To establish an understanding of patient safety within radiography education across Europe by surveying higher education institutions registered as affiliate members of the European Federation of Radiographer Societies (EFRS). Method: An online survey was developed to ascertain data on: programme type, patient safety definitions, relevant safety topics, specific areas taught, teaching and assessment methods, levels of teaching and curriculum drivers. Responses were identifiable in terms of educational institution and country. All 54 affiliated educational institutions were invited to participate. Descriptive and thematic analyses are reported. Results: A response rate of 61.1% (n = 33) was achieved from educational institutions representing 19 countries. Patient safety topics appear to be extremely well covered across curricula, however, topics including radiation protection and optimisation were not reported as being taught at an ‘advanced level’ by five and twelve respondents, respectively. Respondents identified the clinical department as the location of most patient safety-related teaching. Conclusions: Patient safety topics are deeply embedded within radiography curricula across Europe. Variations exist in terms of individual safety topics including, teaching and assessment methods, and the depth in which subjects are taught. Results from this study provide a baseline for assessing developments in curricula and can also serve as a benchmark for comparisons. - Highlights: • First European report on patient safety (PS). • PS deeply embedded within training curricula. • Terms and definitions largely consistent. • Some variety in the delivery and assessment methods. • Report provides baseline and opportunities for comparisons.
Miller, Gerald E.; Hyman, William A.
Describes the status of fluid mechanics courses in bioengineering curricula. A survey of institutions offering bioengineering degrees indicates that over half do not require fluid mechanics courses. Suggests increasing number of mechanics courses to increase the quality of bioengineering students and to prepare students for graduate work and more…
Savin, Mary C.; Longer, David; Miller, David M.
Undergraduate curricula for natural resource and agronomic programs have been introduced and revised during the past several decades with a desire to stay current with emerging issues and technologies relevant to constituents. For the past decade, the Department of Crop, Soil, and Environmental Sciences (CSES) faculty at the University of Arkansas…
Howard, David R.; Miskowski, Jennifer A.; Grunwald, Sandra K.; Abler, Michael L.
At the University of Wisconsin-La Crosse, we have undertaken a program to integrate the study of bioinformatics across the undergraduate life science curricula. Our efforts have included incorporating bioinformatics exercises into courses in the biology, microbiology, and chemistry departments, as well as coordinating the efforts of faculty within…
As China runs towards the forefront of global economic power, people begin to pay growing attention to the quality of life and medical education that play a significant role in sustaining the development by providing healthier labor force. It is evident that in the process of globalization new curricula in line with international standards top…
Eisenberg, John M.
The organization and curricula of internal medicine residencies programs that emphasize primary care are described and compared with traditional residencies in internal medicine. It is noted that primary care residents spend more time in ambulatory care and are allowed more electives in specialties outside of internal medicine. Out-of-hospital…
A recent study of honors curricula across the nation indicates that 75.6% of honors programs and colleges at four-year institutions have thesis or capstone requirements (Savage and Cognard-Black). In addition to institutions with thesis requirements, many more also have the option for students to complete theses. For example, an earlier study…
Watson, Albert L.
Ninety-one members of the National Council on Rehabilitation Education were surveyed concerning the level of importance placed on cross-cultural content in rehabilitation counselor education curricula. Respondents rated 27 of 32 cross-cultural educational offerings as important, and identified seven additional offerings. Respondents' demographic…
Brennan, Ann Marie Walsh; Barnsteiner, Jane; Siantz, Mary Lou de Leon; Cotter, Valeri T; Everett, Janine
There has been limited identification of core lesbian, gay, bisexual, transgendered, or intersexed (LGBTI) experience concepts that should be included in the nursing curricula. This article addresses the gap in the literature. To move nursing toward the goals of health equity and cultural humility in practice, education, and research, nursing curricula must integrate core LGBTI concepts, experiences, and needs related to health and illness. This article reviews LGBTI health care literature to address the attitudes, knowledge, and skills needed to address curricular gaps and provide content suggestions for inclusion in nursing curricula. Also considered is the need to expand nursing students' definition of diversity before discussing the interplay between nurses' attitudes and culturally competent care provided to persons who are LGBTI. Knowledge needed includes a life span perspective that addresses developmental needs and their impact on health concerns throughout the life course; health promotion and disease prevention with an articulation of unique health issues for this population; mental health concerns; specific health needs of transgender and intersex individuals; barriers to health care; interventions and resources including Internet sites; and legal and policy issues. Particular assessment and communication skills for LGBTI patients are identified. Finally, there is a discussion of didactic, simulation, and clinical strategies for incorporating this content into nursing curricula at the undergraduate and graduate levels. Copyright © 2012 Elsevier Inc. All rights reserved.
Smeltzer, Suzanne C; Blunt, Elizabeth; Marozsan, Heather; Wetzel-Effinger, Lisa
To examine the integration of disability-content in a national sample of nurse practitioner curricula. Responses of National Organization of Nurse Practitioner Faculties (NONPF) members to an online 34-item survey designed to assess disability-related content included in nurse practitioner (NP) curricula; populations of people with disabilities addressed; models of disability; and resources used to teach about disability, facilitators and barriers to inclusion of disability, and respondents' assessment of the adequacy of coverage of disability in their programs. A survey used previously to assess integration of disability content in undergraduate nursing programs was modified to make it relevant to NP curricula. Nursing faculty and people with disability validated the survey to ensure its completeness and sensitivity to the disability community. Participating programs represent 111 (33.6%) NP programs. Lack of disability-related content reported by NP faculty in the majority of programs suggests that there is considerable room for improvement in efforts to address this often vulnerable population. Because people with disabilities can be found in any setting where health care is provided, all NPs need to be prepared to care for people with disabilities across the life span. Strategies need to be developed and implemented to increase the awareness of NP faculty about the health issues of people with disabilities and integration of disability-related content without disrupting existing overloaded NP curricula. © 2014 American Association of Nurse Practitioners.
Lindquist, David H.
The content decision-making process involved in developing Holocaust curricula is unusually complex and problematic. Educators must consider factors such as historical accuracy, selection of topics covered, potential teaching materials (such as textbooks and literary texts), and graphic materials (such as films and photographs) as they plan their…
Wood, Bronwyn E.; Cornforth, Sue; Beals, Fiona; Taylor, Mike; Tallon, Rachel
Purpose: The purpose of this paper is to explore the experiences of academic staff who are committed to embedding sustainability within tertiary curricula and pedagogy. Design/Methodology/Approach: The focus of this paper is on a New Zealand university. A survey of staff was undertaken and in-depth interviews conducted with 11 sustainability…
Yi, Kwan; Turner, Ralph
The current landscape of the School Librarianship educational programs and curricula of master's degrees in the USA has been explored. The master's programs are currently offered in the following four venues: (1) programs that are American Library Association (ALA) accredited but not American Association of School Librarians (AASL) recognized,…
Cendan, Juan; Lok, Benjamin
The demonstration of patient-based cases using automated technology [virtual patients (VPs)] has been available to health science educators for a number of decades. Despite the promise of VPs as an easily accessible and moldable platform, their widespread acceptance and integration into medical curricula have been slow. Here, the authors review…
Foltz, C. Bryan; Renwick, Janet S.
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Waguespack, Leslie J.
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
de Goede, M.; Burgess, J.P.
1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered
Voeller, John G
Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R
...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...
Jakku-Sihvonen, Ritva; Tissari, Varpu; Ots, Aivar; Uusiautti, Satu
During the Bologna process, from 2003 to 2006, degree programmes, including teacher education curricula, were developed in line with the two-tier system--the European Credit Transfer and Accumulation System (ECTS) and modularization. The purpose of the present study is to contribute to the development of teacher education profiling measures by…
Kanter, David E.
Project-based science curricula can improve students' usable or meaningful understanding of the science content underlying a project. However, such curricula designed around "performances" wherein students design or make something do not always do this. We researched ways to design performance project-based science curricula (pPBSc) to better…
Mitrović, Miroslav M.; Ivaniš, Željko
Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...
Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.
Full Text Available While the use of computer tools to simulate complex processes such as computer circuits is normal practice in fields like engineering, the majority of life sciences/biological sciences courses continue to rely on the traditional textbook and memorization approach. To address this issue, we explored the use of the Cell Collective platform as a novel, interactive, and evolving pedagogical tool to foster student engagement, creativity, and higher-level thinking. Cell Collective is a Web-based platform used to create and simulate dynamical models of various biological processes. Students can create models of cells, diseases, or pathways themselves or explore existing models. This technology was implemented in both undergraduate and graduate courses as a pilot study to determine the feasibility of such software at the university level. First, a new (In Silico Biology class was developed to enable students to learn biology by "building and breaking it" via computer models and their simulations. This class and technology also provide a non-intimidating way to incorporate mathematical and computational concepts into a class with students who have a limited mathematical background. Second, we used the technology to mediate the use of simulations and modeling modules as a learning tool for traditional biological concepts, such as T cell differentiation or cell cycle regulation, in existing biology courses. Results of this pilot application suggest that there is promise in the use of computational modeling and software tools such as Cell Collective to provide new teaching methods in biology and contribute to the implementation of the "Vision and Change" call to action in undergraduate biology education by providing a hands-on approach to biology.
Helikar, Tomáš; Cutucache, Christine E; Dahlquist, Lauren M; Herek, Tyler A; Larson, Joshua J; Rogers, Jim A
While the use of computer tools to simulate complex processes such as computer circuits is normal practice in fields like engineering, the majority of life sciences/biological sciences courses continue to rely on the traditional textbook and memorization approach. To address this issue, we explored the use of the Cell Collective platform as a novel, interactive, and evolving pedagogical tool to foster student engagement, creativity, and higher-level thinking. Cell Collective is a Web-based platform used to create and simulate dynamical models of various biological processes. Students can create models of cells, diseases, or pathways themselves or explore existing models. This technology was implemented in both undergraduate and graduate courses as a pilot study to determine the feasibility of such software at the university level. First, a new (In Silico Biology) class was developed to enable students to learn biology by "building and breaking it" via computer models and their simulations. This class and technology also provide a non-intimidating way to incorporate mathematical and computational concepts into a class with students who have a limited mathematical background. Second, we used the technology to mediate the use of simulations and modeling modules as a learning tool for traditional biological concepts, such as T cell differentiation or cell cycle regulation, in existing biology courses. Results of this pilot application suggest that there is promise in the use of computational modeling and software tools such as Cell Collective to provide new teaching methods in biology and contribute to the implementation of the "Vision and Change" call to action in undergraduate biology education by providing a hands-on approach to biology.
Romero, Jesus Franklin A.; Leite, Patricia; Mantovani, Gerson L.; Lanfredi, Alexandre J. C.; Martins-Filho, Luiz S.
This paper describes the experience of an introductory discipline to the engineering curricula at the Brazilian Federal University of ABC (UFABC). The university offers a common basic curriculum that must be accomplished by every student and can be followed by professionalising courses. The discipline "Introduction to Engineering"…
Luis Enrique Sánchez
Full Text Available The concept of competence, which emerged during the reform of computer engineering degrees, has not brought benefits to companies when attempting to select the most suitable candidates for their jobs. This article aims to show some of the research that has been conducted to determine why companies have not found these skills useful and how both can be aligned. Finally, we show the development of an Expert System that will enable companies to select the most suitable candidates for their jobs, considering personal and social skills, along with technical knowledge. This prototype will serve as a basis to align the competencies defined in the curricula with professional requirements, thus allowing a true alignment between degree courses and the needs of professional companies.
Nyborg, Mads; Probst, Christian W.; Stassen, Flemming
innovation strategy. In this paper we describe the process of developing new, merged B.Eng curricula in the IT field (Diploma IT), as part of the merger between DTU Lyngby and IHK. Particular attention will be given to the following subjects: • The design process used to develop the new merged study programs......) merged with the Technical University of Denmark (DTU Lyngby). The goal of the merger was to educate ever more innovative diploma engineers to fulfill the needs by Danish industry through combining a practice-oriented development environment and a research-oriented environment. Merging a university...... institutions represented before the merger well 3500 B.Eng. students. The goal of the merger was to combine the best of the existing educations rooted in a practice-oriented development environment and a research-oriented environment. At the same time, the merger was supposed to contribute to the national...
Kahn, Shulamit; Ginther, Donna K.
Women are an increasing percentage of Bachelors in Engineering (BSEs) graduates – rising from 1% in 1970 to 20% in the 2000s – encouraged by increasing K-12 emphasis on attracting girls to STEM and efforts to incorporate engineering and technology into K-12 curricula. Retention of women in STEM and in engineering in particular has been a concern historically. In this paper, we investigate whether this gap has increased because a larger proportion of females entering engineering find themselve...
systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such as quantum key distribution). Moreover, there exist also hybrid models, where traditional crypto...
Senior Security Engineer, Matthew Myrick discusses the current cyber threats that we are all facing, the five W's (who, what, when, where, and how) of cyber security, past and present cyber-attack trends, and ways you can help protect yourself and your enterprise from cyber-attack.
The aim of this paper is to discuss pre-registration radiography education curricula in the context of cancer, changing healthcare delivery in the UK, and the considerable interaction of radiographers with people with cancer. The fitness for purpose of the long-standing curriculum model of alternating academic and clinical learning experiences is questioned and a view expressed that it is no longer sufficient to prepare student radiographers for practice and as professionals. A suggestion is made that curricula should be aligned with cancer (and other) care pathways although it is recognised that such a change would be difficult. It is concluded that the profession should explore what is the appropriate curriculum model given the development of the care pathway approach to healthcare delivery, and, if appropriate, make changes based on research evidence.
Brussow, Jennifer A; Roberts, Karin; Scaruto, Matthew; Sommer, Sheryl; Mills, Christine
As nursing education struggles to address a rapidly changing health care system, overcrowded curricula, and an increased focus on clinical reasoning skills, many programs have adopted or transitioned to concept-based curricula (CBCs), which are structured around key concepts and exemplars. Despite CBC's promised benefits, the process of developing a CBC framework may pose a challenge to programs. To address this barrier, a national study was conducted to develop a representative list of concepts and exemplars. This initiative expands on prior work by suggesting a leveled approach to positioning exemplars within a curricular sequence.This is an open-access article distributed under the terms of the Creative Commons Attribution-Non Commercial-No Derivatives License 4.0 (CCBY-NC-ND), where it is permissible to download and share the work provided it is properly cited. The work cannot be changed in any way or used commercially without permission from the journal.
Ionita, Dan; Bullee, Jan-Willem; Wieringa, Roelf J.
Information Security Risk Assessment can be viewed as part of requirements engineering because it is used to translate security goals into security requirements, where security requirements are the desired system properties that mitigate threats to security goals. To improve the defensibility of
Campbell, G.K.; Hall, J.R. II
The objectives of an integrated security system are to detect intruders and unauthorized activities with a high degree of reliability and the to deter and delay them until effective response/engagement can be accomplished. Definition of an effective integrated security system requires proper application of a system engineering methodology. This paper summarizes a methodology and describes its application to the problem of integrated security system definition. This process includes requirements identification and analysis, allocation of identified system requirements to the subsystem level and provides a basis for identification of synergistic subsystem elements and for synthesis into an integrated system. The paper discusses how this is accomplished, emphasizing at each step how system integration and subsystem synergism is considered. The paper concludes with the product of the process: implementation of an integrated security system
Turkel, Marian C; Fawcett, Jacqueline; Amankwaa, Linda; Clarke, Pamela N; Dee, Vivien; Eustace, Rosemary; Hansell, Phyllis Shanley; Jones, Dorothy A; Smith, Marlaine C; Zahourek, Rothlyn
In this essay, several nurse scholars who are particularly concerned about the contemporary state of nursing science present their concerns about the inclusion of nursing conceptual models and theories in the curricula of nursing programs (dark clouds) and ways in which the concerns have been addressed (bright lights). This essay is the second of two essays that were catalyzed by Barrett's paper, "Again, What Is Nursing Science?" The first essay was published in the previous issue of Nursing Science Quarterly.
Report published in the Proceedings of the National Conference on "Education in the Information Society", Plovdiv, May, 2013 Mathematics and IT classes in the Bulgarian school provide various opportunities for developing students’ logical, mathematical, and technological thinking. Being an important part of mathematical literacy, financial literacy can be systematically built in the frame of national mathematics and IT curricula. Following that objective, exemplary word problems ...
Bennett, Sally; Rodger, Sylvia; Fitzgerald, Cate; Gibson, Libby
Simulated learning experiences are increasingly being used in health-care education to enhance student engagement and provide experiences that reflect clinical practice; however, simulation has not been widely investigated in occupational therapy curricula. The aim of this paper was to: (i) describe the existing research about the use and evaluation of simulation over the last three decades in occupational therapy curricula and (ii) consider how simulation has been used to develop competence in students. A literature review was undertaken with searches of MEDLINE, CINAHL and ERIC to locate articles that described or evaluated the use of simulation in occupational therapy curricula. Fifty-seven papers were identified. Occupational therapy educators have used the full scope of simulation modalities, including written case studies (22), standardised patients (13), video case studies (15), computer-based and virtual reality cases (7), role-play (8) and mannequins and part-task trainers (4). Ten studies used combinations of these modalities and two papers compared modalities. Most papers described the use of simulation for foundational courses, as for preparation for fieldwork, and to address competencies necessary for newly graduating therapists. The majority of studies were descriptive, used pre-post design, or were student's perceptions of the value of simulation. Simulation-based education has been used for a wide range of purposes in occupational therapy curricula and appears to be well received. Randomised controlled trials are needed to more accurately understand the effects of simulation not just for occupational therapy students but for longer term outcomes in clinical practice. © 2017 Occupational Therapy Australia.
María Luz Cacheiro-González
Full Text Available Transnational Networked Curricula (TNC provides many benefits to the institutions that offer them as well as to the different stakeholders involved, not only the students but also the academics, the institutions as a whole, and the wider society. Supporting Higher Education Institutions in enhancing and implementing international networked practices in virtual campus building is the main aim of the NetCU project, which has been developed by the EADTU, in partnership with 14 member organizations, from 2009 to 2012. The project outcomes intend to facilitate the future set-up of networked curricula in Higher Education institutions and potentially lead to more transnational partnerships in Open and Distance Education (ODE and blended learning, showing challenges, obstacles and ways to overcome them. This paper presents the main products developed in the project, assesses its completeness and usage, and discusses on the challenges of curricula networking starting from the ideas and opinions shared in different stakeholders workshops organized under the NetCU project.
Berger, Sarah; Goetz, Katja; Leowardi-Bauer, Christina; Schultz, Jobst-Hendrik; Szecsenyi, Joachim; Mahler, Cornelia
The ability of health professionals to collaborate effectively has significant potential impact on patient safety and quality-care outcomes, especially given the increasingly complex and dynamic clinical practice environments of today. Educators of the health professions are faced with an immediate challenge to adapt curricula and traditional teaching methods to ensure graduates are equipped with the necessary interprofessional competencies and (inter)professional values for their future practice. The World Health Organization's "Framework for action in interprofessional education (IPE) and collaborative practice" promotes IPE as a key strategy to enhance patient outcomes by preparing a "collaborative practice-ready health workforce." Logistical and attitudinal barriers can hinder integration of IPE into curricula. Lessons learned through the implementation of a planned change to establish four interprofessional seminars (team communication, medical error communication, healthcare English, and small business management) at Heidelberg University Medical Faculty, Germany, are described. A key factor in successfully anchoring IPE seminars in the undergraduate curricula was the structured approach drawing on change management concepts.
Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
El-Hadary, Hassan; El-Kassas, Sherif
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.
Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.
El-Hadary, Hassan; El-Kassas, Sherif
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514
Glenn R. Gaudette
Full Text Available In a biomedical engineering lab at Worcester Polytechnic Institute, co-author Dr. Glenn R. Gaudette and his research team are investigating the effects of stem cell therapy on the regeneration of function in damaged cardiac tissue in laboratory rats. Each instance of stem cell experimentation on a rat yields hundreds of data sets that must be carefully captured, documented and securely stored so that the data will be easily accessed and retrieved for papers, reports, further research, and validation of findings, while meeting NIH guidelines for data sharing. After a brief introduction to the bioengineering field and stem cell research, this paper focuses on the experimental workflow and the data generated in one instance of stem cell experimentation; the lab’s data management practices; and how Dr. Gaudette teaches data management to the lab’s incoming graduate students each semester. The co-authors discuss the haphazard manner by which engineering and science students typically learn data management practices, and advocate for the integration of formal data management instruction in higher education STEM curricula. The paper concludes with a discussion of the Frameworks for a Data Management Curriculum developed collaboratively by the co-authors’ institutions -- the University of Massachusetts Medical School and Worcester Polytechnic Institute -- to teach data management best practices to students in the sciences, health sciences, and engineering.
Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.
Security controls using Cullinet's Integrated Data Management System (IDMS) are examined. IDMS software integrity problems, with emphasis on security package interfaces, are disclosed. Solutions applied at Sandia Laboratories Engineering Information Management computing facilty are presented. An overall IDMS computer security philosophy is reviewed
Massacci, F.; Mylopoulos, J.; Zannone, N.
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of security requirements. This paper briefly recaps the concepts proposed for capturing security aspects, and presents an
MARSTON, R M
Security Electronics Circuits Manual is an invaluable guide for engineers and technicians in the security industry. It will also prove to be a useful guide for students and experimenters, as well as providing experienced amateurs and DIY enthusiasts with numerous ideas to protect their homes, businesses and properties.As with all Ray Marston's Circuits Manuals, the style is easy-to-read and non-mathematical, with the emphasis firmly on practical applications, circuits and design ideas. The ICs and other devices used in the practical circuits are modestly priced and readily available ty
Bédard, Denis; Lison, Christelle; Dalle, Daniel; Côté, Daniel; Boutin, Noël
This paper presents results of a study conducted with undergraduate students involved in either problem- or project-based curricula (Medicine and Engineering, respectively) at the Université de Sherbrooke, Canada. The objective of the present research was to measure the impact of these innovative curricula on students' engagement and persistence…
Jefferies, Richard; Sheriff, Ibrahim H N; Matthews, Jacob H; Jagger, Olivia; Curtis, Sarah; Lees, Peter; Spurgeon, Peter C; Fountain, Daniel Mark; Oldman, Alex; Habib, Ali; Saied, Azam; Court, Jessica; Giannoudi, Marilena; Sayma, Meelad; Ward, Nicholas; Cork, Nick; Olatokun, Olamide; Devine, Oliver; O'Connell, Paul; Carr, Phoebe; Kotronias, Rafail Angelos; Gardiner, Rebecca; Buckle, Rory T; Thomson, Ross J; Williams, Sarah; Nicholson, Simon J; Goga, Usman
Purpose Although medical leadership and management (MLM) is increasingly being recognised as important to improving healthcare outcomes, little is understood about current training of medical students in MLM skills and behaviours in the UK. The paper aims to discuss these issues. Design/methodology/approach This qualitative study used validated structured interviews with expert faculty members from medical schools across the UK to ascertain MLM framework integration, teaching methods employed, evaluation methods and barriers to improvement. Findings Data were collected from 25 of the 33 UK medical schools (76 per cent response rate), with 23/25 reporting that MLM content is included in their curriculum. More medical schools assessed MLM competencies on admission than at any other time of the curriculum. Only 12 schools had evaluated MLM teaching at the time of data collection. The majority of medical schools reported barriers, including overfilled curricula and reluctance of staff to teach. Whilst 88 per cent of schools planned to increase MLM content over the next two years, there was a lack of consensus on proposed teaching content and methods. Research limitations/implications There is widespread inclusion of MLM in UK medical schools' curricula, despite the existence of barriers. This study identified substantial heterogeneity in MLM teaching and assessment methods which does not meet students' desired modes of delivery. Examples of national undergraduate MLM teaching exist worldwide, and lessons can be taken from these. Originality/value This is the first national evaluation of MLM in undergraduate medical school curricula in the UK, highlighting continuing challenges with executing MLM content despite numerous frameworks and international examples of successful execution.
Lim William K
Full Text Available Abstract Background Problem-based learning (PBL has become the most significant innovation in medical education of the past 40 years. In contrast to exam-centered, lecture-based conventional curricula, PBL is a comprehensive curricular strategy that fosters student-centred learning and the skills desired in physicians. The rapid spread of PBL has produced many variants. One of the most common is 'hybrid PBL' where conventional teaching methods are implemented alongside PBL. This paper contends that the mixing of these two opposing educational philosophies can undermine PBL and nullify its positive benefits. Schools using hybrid PBL and lacking medical education expertise may end up with a dysfunctional curriculum worse off than the traditional approach. Discussion For hybrid PBL schools with a dysfunctional curriculum, standard PBL is a cost-feasible option that confers the benefits of the PBL approach. This paper describes the signs of a dysfunctional PBL curriculum to aid hybrid PBL schools in recognising curricular breakdown. Next it discusses alternative curricular strategies and costs associated with PBL. It then details the four critical factors for successful conversion to standard PBL: dealing with staff resistance, understanding the role of lectures, adequate time for preparation and support from the administrative leadership. Summary Hybrid PBL curricula without oversight by staff with medical education expertise can degenerate into dysfunctional curricula inferior even to the traditional approach from which PBL emerged. Such schools should inspect their curriculum periodically for signs of dysfunction to enable timely corrective action. A decision to convert fully to standard PBL is cost feasible but will require time, expertise and commitment which is only sustainable with supportive leadership.
The presentation is structured as follows: Overview; Physical Security; Data Security; Intrusion from the Outside; Intrusion From the Inside; Isolate ‘Protected’ Areas; Social Engineering; Questions?
Electrical and control engineering equipment, which has to function even after many years of operation in the event of a fault in a saturated steam atmosphere of 160 C maximum, is essential in nuclear power stations in order to control a loss of coolant accident. The nuclear power station operators have, for this purpose, developed verification strategies for groups of components, by means of which it is ensured that the electrical and control engineering components are capable of dealing with a loss of coolant accident even at the end of their planned operating life. (orig.) [de
Azhar, M Z
Mental health is becoming an important issue. Several local and international studies have proven that the incidence of mental illness is on the rise. Doctors have also been able to make more accurate diagnoses and treat mental disorders more reliably with the aid of recent research and newer drugs. As such it is necessary for the medical curricula to respond to this shift. Medical students must now be exposed to new psychiatric disorders and ways of managing them. The time spent in psychiatry and the mode of teaching must also be revised and modified to the current needs of patients.
Full Text Available Curriculum design and content are key factors in the area of human resource development. To examine the possibility of using a collaboration of Human Computer Interaction (HCI and Educational Technology (ET to develop innovative improvements to the education system, the curricula of these two areas of study were lexically analyzed and compared. As a further example, the curriculum of a joint course in HCI and ET was also lexically analyzed and the contents were examined. These analyses can be used as references in the development of human resources for use in advanced learning environments.
Full Text Available Abstract Background Since the early 1990s there has been a burgeoning interest in global health teaching in undergraduate medical curricula. In this article we trace the evolution of this teaching and present recommendations for how the discipline might develop in future years. Discussion Undergraduate global health teaching has seen a marked growth over the past ten years, partly as a response to student demand and partly due to increasing globalization, cross-border movement of pathogens and international migration of health care workers. This teaching has many different strands and types in terms of topic focus, disciplinary background, the point in medical studies in which it is taught and whether it is compulsory or optional. We carried out a survey of medical schools across the world in an effort to analyse their teaching of global health. Results indicate that this teaching is rising in prominence, particularly through global health elective/exchange programmes and increasing teaching of subjects such as globalization and health and international comparison of health systems. Our findings indicate that global health teaching is moving away from its previous focus on tropical medicine towards issues of more global relevance. We suggest that there are three types of doctor who may wish to work in global health – the ‘globalised doctor’, ‘humanitarian doctor’ and ‘policy doctor’ – and that each of these three types will require different teaching in order to meet the required competencies. This teaching needs to be inserted into medical curricula in different ways, notably into core curricula, a special overseas doctor track, optional student selected components, elective programmes, optional intercalated degrees and postgraduate study. Summary We argue that teaching of global health in undergraduate medical curricula must respond to changing understandings of the term global health. In particular it must be taught from the
Rowson, Mike; Smith, Abi; Hughes, Rob; Johnson, Oliver; Maini, Arti; Martin, Sophie; Martineau, Fred; Miranda, J Jaime; Pollit, Vicki; Wake, Rae; Willott, Chris; Yudkin, John S
Since the early 1990s there has been a burgeoning interest in global health teaching in undergraduate medical curricula. In this article we trace the evolution of this teaching and present recommendations for how the discipline might develop in future years. Undergraduate global health teaching has seen a marked growth over the past ten years, partly as a response to student demand and partly due to increasing globalization, cross-border movement of pathogens and international migration of health care workers. This teaching has many different strands and types in terms of topic focus, disciplinary background, the point in medical studies in which it is taught and whether it is compulsory or optional. We carried out a survey of medical schools across the world in an effort to analyse their teaching of global health. Results indicate that this teaching is rising in prominence, particularly through global health elective/exchange programmes and increasing teaching of subjects such as globalization and health and international comparison of health systems. Our findings indicate that global health teaching is moving away from its previous focus on tropical medicine towards issues of more global relevance. We suggest that there are three types of doctor who may wish to work in global health - the 'globalised doctor', 'humanitarian doctor' and 'policy doctor' - and that each of these three types will require different teaching in order to meet the required competencies. This teaching needs to be inserted into medical curricula in different ways, notably into core curricula, a special overseas doctor track, optional student selected components, elective programmes, optional intercalated degrees and postgraduate study. We argue that teaching of global health in undergraduate medical curricula must respond to changing understandings of the term global health. In particular it must be taught from the perspective of more disciplines than just biomedicine, in order to reflect
Farinha, Carolina Gomes
This study aims to shed some light into the debate of what is a suitable coaching training curricula, specifically in Portugal. We conducted a Delphi study with 5 coaching experts to analyse: i) what is the minimum academic training for a future coach, ii) what is the minimum of hours required for a coaching training program, iii) which competencies should it develop, iv) which contents should the training address, v) which are the requisites for one to be a coaching trainer and, vi) what ...
This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.
The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.
Dewulf, K.; Wever, R.; Boks, C.; Bakker, C.; D'hulster, F.
In recent years, the implementation of sustainability into the curricula of engineering has become increasingly important. This paper focuses on the experiences of integrating sustainability in Design Engineering education in the academic bachelor programs at Delft University of Technology in The
Cleaver, T. G.; And Others
Discusses the objectives, curricula, and accomplishments of an interdisciplinary summer institute designed to prepare college teachers qualified in both the life sciences and engineering. Indicates that joint educational programs between engineering, science, and medical faculties are completely feasible if each group is interested in the other…
Pizard, Sebastián; Vallespir, Diego
Software engineering is the discipline that develops all the aspects of the production of software. Although there are guidelines about what topics to include in a software engineering curricula, it is usually unclear which are the best methods to teach them. In any science discipline the construction of a classification schema is a common…
Are electronic engineering maintenance records relating to the hospital estate or a medical device as important as electronic patient records? Computer maintenance management systems (CMMS) are increasingly being used to manage all-round maintenance activities. However, the accuracy of the data held on them, and a level of security that prevents tampering with records, or other unauthorised changes to them to 'cover' poor practice, are both essential, so that, should an individual be injured or killed on hospital grounds, and a law suit follow, the estates team can be confident that it has accurate data to prove it has fulfilled its duty of care. Here David Easton MSc CEng FIHEEM MIET, director of Zener Engineering Services, and chair of IHEEM's Medical Devices Advisory Group, discusses the issues around maintenance databases, and the security and integrity of maintenance data.
Cummings, Kristina M.
The omnipresence of science and technology in our society require the development of a critical and scientifically literate citizenry. However, the inclusion of socioscientific issues, which are open-ended controversial issues informed by both science and societal factors such as politics, economics, and ethics, do not guarantee the development of these skills. The purpose of this critical discourse analysis is to identify and analyze the discursive strategies used in intermediate science texts and curricula that address socioscientific topics and the extent to which the discourses are designed to promote or suppress the development of scientific literacy and a critical pedagogy. Three curricula that address the issue of energy and climate change were analyzed using Gee's (2011) building tasks and inquiry tools. The curricula were written by an education organization entitled PreSEES, a corporate-sponsored group called NEED, and a non-profit organization named Oxfam. The analysis found that the PreSEES and Oxfam curricula elevated the significance of climate change and the NEED curriculum deemphasized the issue. The PreSEES and Oxfam curricula promoted the development of scientific literacy while the NEED curricula suppressed its development. The PreSEES and Oxfam curricula both promoted the development of the critical pedagogy; however, only the Oxfam curricula provided authentic opportunities to enact sociopolitical change. The NEED curricula suppressed the development of critical pedagogy. From these findings, the following conclusions were drawn. When socioscientific issues are presented with the development of scientific literacy and critical pedagogy, the curricula allow students to develop fact-based opinions about the issue. However, curricula that address socioscientific issues without the inclusion of these skills minimize the significance of the issue and normalize the hegemonic worldview promoted by the curricula's authors. Based on these findings
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...
Anderson, Robert S. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Benjamin, Jacob [Idaho National Lab. (INL), Idaho Falls, ID (United States); Wright, Virginia L. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Quinones, Luis [Idaho National Lab. (INL), Idaho Falls, ID (United States); Paz, Jonathan [Idaho National Lab. (INL), Idaho Falls, ID (United States)
A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.
Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.; Quinones, Luis; Paz, Jonathan
A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.
Ghitescu, Petre; Prisecaru, Ilie
In order to preserve and to improve the quality of nuclear engineering education and training in Europe, as well to ensure the safe and economic operation of nuclear power plants, the European Nuclear Engineering Network Program (ENEN) started in 2002. It is a program aiming to establish and maintain a set of criteria for specific curricula of nuclear engineering education, in particular, for an European Master Degree in Nuclear Engineering (EMNE). The ENEN program is financed by the FP5 and has the wide support of IAEA, OECD and EU Commission departments dealing with the nuclear engineering knowledge management. The promising results up to now determined the creation of the Asian Nuclear Engineering Network (ANEN) in July 2003 and of the World Nuclear University (WNU) starting in September 2003. The paper presents the future structure of EMNE which will allow the harmonization of the curricula of the universities of Europe until the Bologna Convention will be fully accepted and operational in all European countries. The ENEN program has taken into consideration the curricula of 22 universities and research centres from 15 different European countries and proposed a feasible scheme which allows the undergraduates with a weak to strong nuclear background to continue their graduate education in the nuclear engineering field towards EMNE. As one of the contractors of this program, University 'Politehnica' of Bucharest brings its contribution and actively takes part in all activities establishing the EMNE. (author)
Michael M. Hull
Full Text Available In this paper, we show data from the Colorado Learning Attitudes about Science Survey that suggests that Georgetown physics majors become increasingly expert in their attitudes towards physics learning and knowing after taking a course that combines two reformed curricula, Matter and Interactions (M&I and Tutorials in Introductory Physics (TIPs. This occurs even though the two curricula do not send a consistent epistemological message to students. We analyze interview video data of two of these students to illustrate examples of this growth. We examine video data of one of these students in a tutorial session to describe a possible mechanism that may have contributed to the growth. Finally, we compare this qualitative video data with quantitative data from the newly developed Perceptions of Physics Classes survey and discuss aggregate responses to this survey in considering the ways in which other students developed more expertlike attitudes in this course. We conclude that the attitudinal growth observed cannot be explained simply “as the result of” either M&I or of TIPs but rather find the most plausible explanation to be that the growth is an emergent phenomena produced by M&I and TIPs working together in concert with other factors.
Cronholm, Peter F; Singh, Vijay; Fogarty, Colleen T; Ambuel, Bruce
Violence is a significant public health issue with far-reaching implications for the health of individuals and their communities. Our objective was to describe trends in violence-related training in family medicine residency programs since the last national survey was conducted in 1997. Surveys were sent to 337 US family medicine residency programs with the program director having active Society of Teachers of Family Medicine (STFM) membership. Measures included residency setting and characteristics, violence-related curricular content, teaching techniques and personnel, timing of content, and impact of changes in Residency Review Committee (RRC) and Accreditation Council for Graduate Medical Education (ACGME) requirements. Descriptive statistics and bivariate analyses comparing measures across time were used. A total of 201 (60%) surveys were completed. The most common violence curricula was child (83%) and elder abuse (76%), and the most common teachers of violence-related content were family physicians, psychologists, and social workers. The most common teaching methods were clinical precepting (94%), lectures (90%), case vignettes (71%), and intimate partner violence (IPV) shelter experiences (67%). ACGME and RRC changes were not reflected in self-reported measures of curricular emphasis or time. Violence curricular content and number of hours has been constant in family medicine residencies over time. An increase in the reported use of active learning strategies was identified as a trend across surveys. Next steps for violence curricula involve assessment of residents' competency to identify and intervene in violence.
Kumar, P.; Siddiqui, A.; Gupta, K.; Jain, S.; Krishna Murthy, Y. V. N.
Geospatial technology has widespread usage in development planning and resource management. It offers pragmatic tools to help urban and regional planners to realize their goals. On the request of Ministry of Urban Development, Govt. of India, the Indian Institute of Remote Sensing (IIRS), Dehradun has taken an initiative to study the model syllabi of All India Council for Technical Education for planning curricula of Bachelor and Master (five disciplines) programmes. It is inferred that geospatial content across the semesters in various planning fields needs revision. It is also realized that students pursuing planning curricula are invariably exposed to spatial mapping tools but the popular digital drafting software have limitations on geospatial analysis of planning phenomena. Therefore, students need exposure on geospatial technologies to understand various real world phenomena. Inputs were given to seamlessly merge and incorporate geospatial components throughout the semesters wherever seems relevant. Another initiative by IIRS was taken to enhance the understanding and essence of space and geospatial technologies amongst the young minds at 10+2 level. The content was proposed in a manner such that youngsters start realizing the innumerable contributions made by space and geospatial technologies in their day-to-day life. This effort both at school and college level would help in not only enhancing job opportunities for young generation but also utilizing the untapped human resource potential. In the era of smart cities, higher economic growth and aspirations for a better tomorrow, integration of Geospatial technologies with conventional wisdom can no longer be ignored.
Mospan, Cortney M
To encourage the academy to pursue innovative management education strategies within pharmacy curricula and highlight these experiences in a scholarly dialogue. Management has often been a dreaded, dry, and often neglected aspect of pharmacy curricula. With the release of Center for Advancement of Pharmacy Education (CAPE) Educational Outcomes 2013 as well as Entry-Level Competencies Needed for Community Pharmacy Practice by National Association of Chain Drug Stores (NACDS) Foundation, National Community Pharmacists Association (NCPA), and Accreditation Council for Pharmacy Education (ACPE) in 2012, managerial skills have seen a new emphasis in pharmacy education. Further, management has greater emphasis within ACPE "Standards 2016" through adoption of CAPE Educational Outcomes 2013 into the standards. Previous literature has shown success of innovative learning strategies in management education such as active learning, use of popular television shows, and emotional intelligence. The academy must build a more extensive scholarly body of work highlighting successful educational strategies to engage pharmacy students in an often-dreaded subject through applying the Scholarship of Teaching and Learning. Copyright © 2017 Elsevier Inc. All rights reserved.
Joseph, Sundari; Juwah, Charles
Constructive alignment theory has been used to underpin the development of curricula in higher education for some time (Biggs and Tang, 2007), however, its use to inform and determine skills curricula in nursing is less well documented. This paper explores the use of constructive alignment theory within a study of undergraduate student nurses undertaking clinical skill acquisition in the final year of a BSc (Hons) Nursing course. Students were followed up as newly qualified nurses (NQN) (n = 58) to ascertain the impact of skill acquisition in this way. Comparisons were made with newly qualified nurses who did not participate in a constructively aligned curriculum. This mixed methods study reported skill identification within the immediate post-registration period and evaluated the constructively aligned curriculum as having positive benefits for NQNs in terms of confidence to practice. This was supported by preceptors' views. The study recommends two process models for nursing skills curriculum development and reports that constructive alignment is a useful theoretical framework for nurse educators. Copyright © 2011 Elsevier Ltd. All rights reserved.
Social and Labour Bulletin, 1983
This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)
Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de
Nelson, Peter R; Coffin, Marie
The Accreditation Board for Engineering and Technology (ABET) introduced a criterion starting with their 1992-1993 site visits that "Students must demonstrate a knowledge of the application of statistics to engineering problems." Since most engineering curricula are filled with requirements in their own discipline, they generally do not have time for a traditional two semesters of probability and statistics. Attempts to condense that material into a single semester often results in so much time being spent on probability that the statistics useful for designing and analyzing engineering/scientific experiments is never covered. In developing a one-semester course whose purpose was to introduce engineering/scientific students to the most useful statistical methods, this book was created to satisfy those needs. - Provides the statistical design and analysis of engineering experiments & problems - Presents a student-friendly approach through providing statistical models for advanced learning techniques - Cove...
Taplay, Karyn; Jack, Susan M; Baxter, Pamela; Eva, Kevin; Martin, Lynn
The aim of this study is to explain the process of adopting and incorporating simulation as a teaching strategy in undergraduate nursing programs, define uptake, and discuss potential outcomes. In many countries, simulation is increasingly adopted as a common teaching strategy. However, there is a dearth of knowledge related to the process of adoption and incorporation. We used an interpretive, constructivist approach to grounded theory to guide this research study. We conducted the study was in Ontario, Canada, during 2011-2012. Using multiple data sources, we informed the development of this theory including in-depth interviews (n = 43) and a review of key organizational documents, such as mission and vision statements (n = 67) from multiple nursing programs (n = 13). The adoption and uptake of mid- to high-fidelity simulation equipment is a multistep iterative process involving various organizational levels within the institution that entails a seven-phase process: (a) securing resources, (b) nursing leaders working in tandem, (c) getting it out of the box, (d) learning about simulation and its potential for teaching, (e) finding a fit, (f) trialing the equipment, and (g) integrating into the curriculum. These findings could assist nursing programs in Canada and internationally that wish to adopt or further incorporate simulation into their curricula and highlight potential organizational and program level outcomes. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.
Muhammad Siddique Ansari
Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers
Assessing the feasibility of integrating ecosystem-based with engineered water resource governance and management for water security in semi-arid landscapes: A case study in the Banas catchment, Rajasthan, India.
Everard, Mark; Sharma, Om Prakash; Vishwakarma, Vinod Kumar; Khandal, Dharmendra; Sahu, Yogesh K; Bhatnagar, Rahul; Singh, Jitendra K; Kumar, Ritesh; Nawab, Asghar; Kumar, Amit; Kumar, Vivek; Kashyap, Anil; Pandey, Deep Narayan; Pinder, Adrian C
Much of the developing world and areas of the developed world suffer water vulnerability. Engineering solutions enable technically efficient extraction and diversion of water towards areas of demand but, without rebalancing resource regeneration, can generate multiple adverse ecological and human consequences. The Banas River, Rajasthan (India), has been extensively developed for water diversion, particularly from the Bisalpur Dam from which water is appropriated by powerful urban constituencies dispossessing local people. Coincidentally, abandonment of traditional management, including groundwater recharge practices, is leading to increasingly receding and contaminated groundwater. This creates linked vulnerabilities for rural communities, irrigation schemes, urban users, dependent ecosystems and the multiple ecosystem services that they provide, compounded by climate change and population growth. This paper addresses vulnerabilities created by fragmented policy measures between rural development, urban and irrigation water supply and downstream consequences for people and wildlife. Perpetuating narrowly technocentric approaches to resource exploitation is likely only to compound emerging problems. Alternatively, restoration or innovation of groundwater recharge practices, particularly in the upper catchment, can represent a proven, ecosystem-based approach to resource regeneration with linked beneficial socio-ecological benefits. Hybridising an ecosystem-based approach with engineered methods can simultaneously increase the security of rural livelihoods, piped urban and irrigation supplies, and the vitality of river ecosystems and their services to beneficiaries. A renewed policy focus on local-scale water recharge practices balancing water extraction technologies is consistent with emerging Rajasthani policies, particularly Jal Swavlamban Abhiyan ('water self-reliance mission'). Policy reform emphasising recharge can contribute to water security and yield socio
Tipton, Harold F
Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.
Jippes, Mariëlle; Majoor, Gerard D
Integrated curricula have been implemented in medical schools all over the world. However, among countries different relative numbers of schools with integrated curricula are found. This study aims to explore the possible correlation between the percentage of medical schools with integrated curricula in a country and that country's cultural characteristics. Curricula were defined as not integrated if in the first 2 years of the program at least two out of the three monodisciplinary courses Anatomy, Physiology and Biochemistry were identified. Culture was defined using Hofstede's dimensions Power distance, Uncertainty avoidance, Masculinity/Femininity, and Individualism/Collectivism. Consequently, this study had to be restricted to the 63 countries included in Hofstede's studies which harbored 1,195 medical schools. From each country we randomly sampled a maximum of 15 schools yielding 484 schools to be investigated. In total 91% (446) of the curricula were found. Correlation of percent integrated curricula and each dimension of culture was determined by calculating Spearman's Rho. A high score on the Power distance index and a high score on the Uncertainty avoidance index correlated with a low percent integrated curricula; a high score on the Individualism index correlated with a high percent integrated curricula. The percentage integrated curricula in a country did not correlate with its score on the Masculinity index. National culture is associated with the propensity of medical schools to adopt integrated medical curricula. Consequently, medical schools considering introduction of integrated and problem-based medical curricula should take into account dimensions of national culture which may hinder the innovation process.
When discussing manufacturing engineering education you always end up discussing curricula development, course design, specific topics to be taught, etc. Very rarely it is discussed, how a manufacturing engineering department ought to be designed to create an attractive environment for students...... and the requirements to the products/services identified. The organisation necessary to develop the department is outlined as well as the process to implement the vision....
Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.
IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.
Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles
Computer Security Team
Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710. Winners must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally… …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
Ower, Peter S.
Using a phenomenological methodology, a cohort of four experienced science teachers was interviewed about their experience transitioning from traditional, teacher and fact-centered science curricula to inquiry-based curricula. Each teacher participated in two interviews that focused on their teaching backgrounds, their experience teaching the prior traditional curriculum, and their experience teaching the new inquiry-based curriculum. The findings are presented as a narrative of each teachers' experience with the new curriculum implementation. Analyzing the data revealed four key themes. 1) The teachers felt trapped by the old curriculum as it did not align with their positive views of teaching science through inquiry. 2) The teachers found a way to fit their beliefs and values into the old and new curriculum. This required changes to the curriculum. 3) The teachers attempted to make the science curriculum as meaningful as possible for their students. 4) The teachers experienced a balancing act between their beliefs and values and the various aspects of the curriculum. The revealed essence of the curriculum transition is one of freedom and reconciliation of their beliefs. The teachers experienced the implementation of the new curriculum as a way to ensure their values and beliefs of science education were embedded therein. They treated the new curriculum as a malleable structure to impart their grander ideas of science education (e.g. providing important skills for future careers, creating a sense of wonder, future problem solving) to the students. Their changes were aligned with the philosophy of the curriculum kits they were implementing. Thus, the fidelity of the curriculum's philosophy was not at risk even though the curriculum kits were not taught as written. This study showed that phenomenological methods are able to reveal the relationship between a teacher's prior experiences, values and beliefs and their current instructional philosophy in science
McCarthy, Joseph J.; Parker, Robert S.; Abatan, Adetola; Besterfield-Sacre, Mary
Increasing knowledge integration has gained wide-spread support as an important goal in engineering education. The Chemical Engineering Pillars curriculum at the University of Pittsburgh, unique for its use of block scheduling, is one of the first four-year, integrated curricula in engineering, and is specifically designed to facilitate knowledge…
Discusses the development of non-technical education and ethics in engineering curricula in Europe and particularly in France. Investigates two projects at the Catholic University of Lille. The first project is an engineering ethics course and the second has to do with writing a European handbook on engineering ethics as a discipline. (Contains 28…
Dunigan, T.H.; Venugopal, N.
This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.
Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag
Awad, Ahmed; Woungang, Isaac
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .
Parks-Leduc, Laura; Rutherford, Matthew A.; Becker, Karen L.; Shahzad, Ali M.
This study explores the state of undergraduate human resource management (HRM) curricula worldwide in an effort to understand the extent to which there is an agreed-upon body of knowledge underpinning the field of HRM. We reviewed the undergraduate curricula for all business schools that were accredited by either the Association to Advance…
Drs Rens Gresnigt; Koeno Gravemeijer; Hanno Keulen, van; Liesbeth Baartman; Ruurd Taconis
Integrated curricula seem promising for the increase of attention on science and technology in primary education. A clear picture of the advantages and disadvantages of integration efforts could help curriculum innovation. This review has focussed on integrated curricula in primary education from
Gresnigt, H.L.L.; Taconis, R.; Keulen, van Hanno; Gravemeijer, K.P.E.; Baartman, L.K.J.
Integrated curricula seem promising for the increase of attention on science and technology in primary education. A clear picture of the advantages and disadvantages of integration efforts could help curriculum innovation. This review has focused on integrated curricula in primary education from
Hanno van Keulen; Rens Gresnigt; Liesbeth Baartman; Ruurd Taconis; Koeno Gravemeijer
Integrated curricula seem promising for the increase of attention on science and technology in primary education. A clear picture of the advantages and disadvantages of integration efforts could help curriculum innovation. This review has focussed on integrated curricula in primary education from
Mikitka, Kathleen Faith; Van Camp, Mary Lou
A study was done of higher education curricula with substantial enrollment by women (such as fashion merchandising and home economics) to examine the context and substance of the curricula, to identify infrastructures that have supported these programs, and to probe issues that face administrators, faculty and students engaged in such programs.…
Bottema-Beutel, Kristen; Park, Haerin; Kim, So Yoon
By teaching social rules thought to be necessary for social competence, social skills training (SST) curricula aim to improve indicators of well-being for individuals with autism spectrum disorder (ASD), such as the attainment of meaningful friendships. However, several recent meta-analyses indicate that SST curricula may fall short of these…
Merey, Zihni; Kus, Zafer; Karatekin, Kadir
The purpose of this study is to compare the social studies teaching curricula of Turkey and the United States in terms of values education. The study is a model case study that relies upon one of the qualitative research methods. The data come from the elementary social studies curricula of both countries through the documents analysis method. The…
What Works Clearinghouse, 2013
"Carnegie Learning Curricula and Cognitive Tutor"®, published by Carnegie Learning, is a secondary math curricula that offers textbooks and interactive software to provide individualized, self-paced instruction based on student needs. The program includes pre-Algebra, Algebra I, Algebra II, and Geometry, as well as a three-course series…
Taylor, Carol A.; Bovill, Catherine
This article brings together the authors' previous work on co-created curricula (Bovill, 2013a, 2014; Bovill et al., 2011) and on partnership and ethics (Taylor, 2015; Taylor and Robinson, 2014), to develop the concept of co-created curricula as an ecology of participation. In doing so, it deploys Alfred North Whitehead's process philosophy to…
Philippou, Stavroula; Keating, Avril; Ortloff, Debora Hinderliter
This special issue of "JCS" has examined the changes and challenges facing citizenship education policy and curricula by way of case studies from Europe and beyond. It is indicated that European and/or global integration have had an impact on all of the citizenship curricula examined. However, it is also noted that each case…
Sayeski, Kristin L.; Paulsen, Kim J.
In many general education classrooms today, teachers are using "reform" mathematics curricula. These curricula emphasize the application of mathematics in real-life contexts and include such practices as collaborative, group problem solving and student-generated algorithms. Students with learning disabilities in the area of mathematics can…
Fisher, Josie; Bonn, Ingrid
Global initiatives and a rapidly expanding academic literature identify the responsibility that universities have to incorporate sustainability education into their curricula. This study had two aims: first, to investigate the extent to which Australian undergraduate management curricula explicitly identified a focus on sustainability and, second,…
Russell, Jack; Russell, Barbara; Pollacia, Lissa F.; Tastle, William J.
This paper researches the computer languages taught in the first, second and third programming courses in Computer Information Systems (CIS), Management Information Systems (MIS or IS) curricula as well as in Computer Science (CS) and Information Technology (IT) curricula. Instructors teaching the first course in programming within a four year…
Kolloffel, Bas Jan; de Jong, Anthonius J.M.
Background: Traditionally, engineering curricula about electrical circuits use textbook instruction and hands-on lessons, which are effective approaches for teaching terms and definitions, the procedural use of formulas, and how to build circuits. Nonetheless, students often lack conceptual
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/)
Okudan Kremer, Gül E.; Simpson, Timothy W.; Ashour, Omar M.
In this paper, we present our efforts in embedding product archeology inspired curricula into two engineering courses along with assessment results. The assessment focuses on the effectiveness of the embedded curricula in enhancing students' understanding on the global, societal, environmental, and economic (GSEE) implications of engineering…
in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...
... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...
Krout, John A; Wasyliw, Zenon
This paper describes a model process to increase the exposure of middle and high school students to information on aging so they better understand the implications of an aging population and the stereotypes of older adults. A college Gerontology Institute, a social studies teacher education faculty member, and middle/high school social studies teachers collaborated on a program to develop and implement lesson plans that incorporate information on aging into existing courses. Institute staff provided expertise on gerontology and student teachers assisted in writing lesson plan objectives. Teachers developed about a dozen lessons covering from one class to two weeks in subjects such as global history, participation in government, Western civilizations, economics, and government. This experience suggests a number of issues that should be addressed when developing a gerontology infusion initiative with school teachers. Information on aging can be successfully incorporated into existing school curricula within the constraints of mandated learning objectives.
Sørensen, Esben Munk; Enemark, Stig
Programme has been divided into a 3 year Bachelor-Programme and after this a 2 year Master-Programme. It has been done as a part of a governmental policy to adapt and fulfil the Bologna-charter in all University Curricula in Denmark. A new element in the Master Programme is a problem-based internship...... economy and – leadership”. This course is organized as an e-Learning course and the student has to develop and document their skills to follow distance e-learning courses. It will prepare them to follow and organize self paced learning in virtual environment which will develop their capacity for life...... by the society to serve the community with still more new knowledge and technology transfer from the international research community. The internship and still more real world influenced problem based learning by writing thesis will be and important bridge builder in the following years....
Ioana Chan Mow
Full Text Available The research documented in this paper attempted to answer the question of how relevant the content of the Computing courses offered within programs of the Computing Department at the National University of Samoa (NUS were to meet the needs of industry and the workforce. The RINCCII study which was conducted in 2013 to 2014, surveyed 13 institutions and 19 graduates from the Computing programs. Findings from the survey indicated that the current course offerings within the Computing department are relevant to the needs of industry and the workplace. However there are aspects or topics which need inclusion or better coverage. The study also recommended regular surveys to gauge relevance of curricula to needs of industry.
Full Text Available Multimedia technology is restructuring the field of communication in various ways. The prevalent nature of this new media invites flexibility which can make communication curricula accommodate a wide range of competencies including technical competency. I have argued in this paper that multimedia, much like printing, radio, television and film, is mainly the means whereby content is delivered. Central to multimedia are content and effects. Content requires perspective which can then be reproduced in texts and images, while effects involves assessment of the influence of multimedia on society and culture. As such, multimedia needs to be approached from a mass communication perspective which preserves the identity of the field and provides a vital link between theory and practical application.
Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...
Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...
Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.
In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.
Nazar, Mahdi; Kendall, Kathleen; Day, Lawrence; Nazar, Hamde
The General Medical Council (GMC) expects that medical students graduate with an awareness of how the diversity of the patient population may affect health outcomes and behaviours. However, little guidance has been provided on how to incorporate diversity teaching into medical school curricula. Research highlights the existence of two different models within medical education: cultural competency and cultural humility. The Southampton medical curriculum includes both models in its diversity teaching, but little was known about which model was dominant or about the students' experience. Fifteen semi-structured, in-depth interviews were carried out with medical students at the University of Southampton. Data were analysed thematically using elements of grounded theory and constant comparison. Students identified early examples of diversity teaching consistent with a cultural humility approach. In later years, the limited diversity teaching recognised by students generally adopted a cultural competency approach. Students tended to perceive diversity as something that creates problems for healthcare professionals due to patients' perceived differences. They also reported witnessing a number of questionable practices related to diversity issues that they felt unable to challenge. The dissonance created by differences in the largely lecture based and the clinical environments left students confused and doubting the value of cultural humility in a clinical context. Staff training on diversity issues is required to encourage institutional buy-in and establish consistent educational and clinical environments. By tackling cultural diversity within the context of patient-centred care, cultural humility, the approach students valued most, would become the default model. Reflective practice and the development of a critical consciousness are crucial in the improvement of cultural diversity training and thus should be facilitated and encouraged. Educators can adopt a
Wright, D. J.; Dibiase, D.; Harvey, F.; Solem, M.
Professionalism in today's rapidly-growing, multidisciplinary geographic information science field (e.g., geographic information systems or GIS, remote sensing, cartography, quantitative spatial analysis), now involves a commitment to ethical practice as informed by a more sophisticated understanding of the ethical implications of geographic technologies. The lack of privacy introduced by mobile mapping devices, the use of GIS for military and surveillance purposes, the appropriate use of data collected using these technologies for policy decisions (especially for conservation and sustainability) and general consequences of inequities that arise through biased access to geospatial tools and derived data all continue to be challenging issues and topics of deep concern for many. Students and professionals working with GIS and related technologies should develop a sound grasp of these issues and a thorough comprehension of the concerns impacting their use and development in today's world. However, while most people agree that ethics matters for GIS, we often have difficulty putting ethical issues into practice. An ongoing project supported by NSF seeks to bridge this gap by providing a sound basis for future ethical consideration of a variety of issues. A model seminar curriculum is under development by a team of geographic information science and technology (GIS&T) researchers and professional ethicists, along with protocols for course evaluations. In the curricula students first investigate the nature of professions in general and the characteristics of a GIS&T profession in particular. They hone moral reasoning skills through methodical analyses of case studies in relation to various GIS Code of Ethics and Rules of Conduct. They learn to unveil the "moral ecologies" of a profession through actual interviews with real practitioners in the field. Assignments thus far include readings, class discussions, practitioner interviews, and preparations of original case
Kearfott, K.J.; Wepfer, W.J.
Several U.S. universities maintain formal graduate health physics curricula within their Colleges of Engineering. The term radiological engineering was coined to describe the discipline of applying engineering principles to the radiation protection aspects of nuclear technology. Radiological engineering programmes may require a specific core group of courses such as radiation biology, radiation protection practice, nuclear physics, radiation detectors, and radiation dosimetry. Students then might specialist in environmental, nuclear facilities or medical applications areas by selecting advanced courses and graduate design or research projects. In some instances the master's degree may be completed through remotely-delivered lectures. Such programmes promise to assist in educating a new group of engineering professionals dedicated to the safe utilisation of nuclear technology. The Georgis Institute of Technology's programme will serve as the specific example for this report. 8 refs., 1 fig
Boutnaru, Shlomi; Hershkovitz, Arnon
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…
This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness
Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.
Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread security as one of a long list of quality factors that are expected from all professionally developed software. As software systems of today have a wide reach, security has become a more important factor than ever in the history of software engineering can no longer be treated as Separ...
Kerrick, Sharon S.; Vincent, Charles D.
This report provides the summary of a project whose purpose was to support the costs of developing a nuclear engineering awareness program, an instruction program for teachers to integrate lessons on nuclear science and technology into their existing curricula, and web sites for the exchange of nuclear engineering career information and classroom materials. The specific objectives of the program were as follows: OBJECTIVE 1: INCREASE AWARENESS AND INTEREST OF NUCLEAR ENGINEERING; OBJECTIVE 2: INSTRUCT TEACHERS ON NUCLEAR TOPICS; OBJECTIVE 3: NUCLEAR EDUCATION PROGRAMS WEB-SITE; OBJECTIVE 4: SUPPORT TO UNIVERSITY/INDUSTRY MATCHING GRANTS AND REACTOR SHARING; OBJECTIVE 5: PILOT PROJECT; OBJECTIVE 6: NUCLEAR ENGINEERING ENROLLMENT SURVEY AT UNIVERSITIES
Purpura, Philip P
Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur
This textbook is ideal for mechanical engineering students preparing to enter the workforce during a time of rapidly accelerating technology, where they will be challenged to join interdisciplinary teams. It explains system dynamics using analogies familiar to the mechanical engineer while introducing new content in an intuitive fashion. The fundamentals provided in this book prepare the mechanical engineer to adapt to continuous technological advances with topics outside traditional mechanical engineering curricula by preparing them to apply basic principles and established approaches to new problems. This book also: · Reinforces the connection between the subject matter and engineering reality · Includes an instructor pack with the online publication that describes in-class experiments with minimal preparation requirements · Provides content dedicated to the modeling of modern interdisciplinary technological subjects, including opto-mechanical systems, high...
Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)
The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.
McFarland Kendall, Amber Leigh
K-12 standards and curricula are beginning to include engineering design as a key practice within Science Technology Engineering and Mathematics (STEM) education. However, there is little research on how the youngest students engage in engineering design within the elementary classroom. This dissertation focuses on iteration as an essential aspect of engineering design, and because research at the college and professional level suggests iteration improves the designer's understanding of problems and the quality of design solutions. My research presents qualitative case studies of students in kindergarten and third-grade as they engage in classroom engineering design challenges which integrate with traditional curricula standards in mathematics, science, and literature. I discuss my results through the lens of activity theory, emphasizing practices, goals, and mediating resources. Through three chapters, I provide insight into how early-elementary students iterate upon their designs by characterizing the ways in which lesson design impacts testing and revision, by analyzing the plan-driven and experimentation-driven approaches that student groups use when solving engineering design challenges, and by investigating how students attend to constraints within the challenge. I connect these findings to teacher practices and curriculum design in order to suggest methods of promoting iteration within open-ended, classroom-based engineering design challenges. This dissertation contributes to the field of engineering education by providing evidence of productive engineering practices in young students and support for the value of engineering design challenges in developing students' participation and agency in these practices.
Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi
Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today'
Casajús Ramo, A
DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...
A complete study guide for the new CCNA Security certification exam. In keeping with its status as the leading publisher of CCNA study guides, Sybex introduces the complete guide to the new CCNA security exam. The CCNA Security certification is the first step towards Cisco's new Cisco Certified Security Professional (CCSP) and Cisco Certified Internetworking Engineer-Security. With a foreword by CCNA networking authority Todd Lammle, CCNA Security Study Guide fully covers every exam objective. The companion CD includes the Sybex Test Engine, flashcards, and a PDF of the book.: The CCNA Securit
Tarvo Niine; Ott Koppel
Logistics is an interdisciplinary field of study. Modern logisticians need to integrate business management and administration skills with technology design, IT systems and other engineering fields. However, based on research of university curricula and competence standards in logistics, the engineering aspect is not represented to full potential. There are some treatments of logistician competences which relate to engineering, but not a modernized one with wide-spread recognition. This paper...
Green, Courtney A; Chern, Hueylan; O'Sullivan, Patricia S
Current robot surgery curricula developed by industry were designed for expert surgeons. We sought to identify the robotic curricula that currently exist in general surgery residencies and describe their components. We identified 12 residency programs with robotic curricula. Using a structured coding form to identify themes including sequence, duration, emphasis and assessment, we generated a descriptive summary. Curricula followed a similar sequence: learners started with online modules and simulation exercises, followed by bedside experience during R2-R3 training years, and then operative opportunities on the console in the final years of training. Consistent portions of the curricula reflect a device-dependent training paradigm; they defined the sequence of instruction. Most curricula lacked specifics on duration and content of training activities. None clearly described cognitive or psychomotor skills needed by residents and none required a proficiency assessment before graduation. Resident-specific robotic curricula remain grounded in initial industrial efforts to train experienced surgeons, are non-specific regarding the type and nature of hands on experience, and do not include discussion of operative technique and surgical concepts. Copyright © 2017 Elsevier Inc. All rights reserved.
Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.
Hillesheim, Christina S.
The purpose of this study was to investigate the difference between the "atoms first" and the "traditional" curricula. Specifically focusing on which curriculum better aligns to curricular expectations, leads to higher student success when students are grouped together, and when students are differentiated based on several factors. The main difference between the two approaches being the sequence of topics presented in the first semester general chemistry course. This study involves more than 9,500 general chemistry I and II students over 7 semesters with about half of them being taught using the "atoms first" approach. Student success was measured using the American Chemical Society's (ACS) final examination scores and the final letter grades. Alignment to curricular expectations was determined via a qualitative review of textbooks written for each of the approaches. This showed that the "atoms first" approach better aligns to research supported best practices. An analysis of covariance (ANCOVA) was performed to determine if there is a significant difference between the "atoms first" and the "traditional" curricula. The "traditional" approach was found to lead to higher student achievement for both measures of student success in both chemistry I and II courses. Lastly, multiple linear, multinomial logistic, and binary logistic regressions were run using all of the subgroups---gender, race/ethnicity, major, ACT composite, math ACT, overall GPA, and classroom size---as predictor variables to determine if any significant interactions between the curricular methods and the different subgroups existed. Results found that the relationship between gender, GPA, and classroom size groupings significantly impact student achievement in general chemistry. Specifically, the "traditional" approach lead to higher student success compared to the "atoms first" approach for males, females, below average GPA students, above average GPA students, and students in large classroom
Chesler, Naomi C; Ruis, A R; Collier, Wesley; Swiecki, Zachari; Arastoopour, Golnaz; Williamson Shaffer, David
Engineering virtual internships are a novel paradigm for providing authentic engineering experiences in the first-year curriculum. They are both individualized and accommodate large numbers of students. As we describe in this report, this approach can (a) enable students to solve complex engineering problems in a mentored, collaborative environment; (b) allow educators to assess engineering thinking; and (c) provide an introductory experience that students enjoy and find valuable. Furthermore, engineering virtual internships have been shown to increase students'-and especially women's-interest in and motivation to pursue engineering degrees. When implemented in first-year engineering curricula more broadly, the potential impact of engineering virtual internships on the size and diversity of the engineering workforce could be dramatic.
Kampf, Constance; Isohella, Suvi
In this paper, we argue for a place for project management in the English Studies and Communication Studies curricula, often the home of Technical Communication programs, in order to offer students an opportunity to apply their language, discourse analysis, analytical skills, and creativity in a ...... of the project management genres are briefly discussed and related to key skills emerging from English studies and Technical Communication curricula.......In this paper, we argue for a place for project management in the English Studies and Communication Studies curricula, often the home of Technical Communication programs, in order to offer students an opportunity to apply their language, discourse analysis, analytical skills, and creativity...
Hartel, Pieter H.; Junger, Marianne
We report on an educational experiment where information security master students were encouraged to think out of the box. Instead of taking the usual point of view of the security engineer we challenged the students to take the point of view of the motivated offender. We report on the exciting
Securities issues in oil and gas reserves reporting were discussed. Alberta requires specific information regarding important oil and gas properties, plants, facilities and installations. When preparing the reserves report, the following elements are important to consider: (1) the author of the report must be a registered professional engineer or registered professional geologist, (2) the report itself must be an engineering document, (3) the content of the report must be extensive, (4) it should be prepared in accordance with petroleum engineering and evaluation practices, and must include a summary of estimated net reserves
Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.
Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is
Ridder, M. de
Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no
Lumsden, M A; Symonds, I M
There are many challenges facing undergraduate education in the smaller specialities such as obstetrics and gynaecology (O&G). These are similar throughout the world, although the emphasis may vary according to geography and the approach of those involved in medical education in general. The number of medical students has increased because of the greater number of doctors required, the gender balance and also because it provides revenue for the universities. This means that strategies must be developed to include more teaching units in both primary and secondary care as well as those at a distance from the main teaching provider. Australia and the UK both have this problem but, obviously, the distances involved in Australia are much greater. One of the drivers for the change in undergraduate medical education in the UK was factual overload and the need to teach basic competencies to the students. National curricula that take this into account are being developed and that in the UK has been taken up by a majority of the medical schools. The opportunities offered by O&G to provide basic skills and competencies difficult to find elsewhere in the curriculum are unparalleled. These include issues such as communication in situations where great sensitivity is required and also the impact of cultural beliefs and ethnicity on clinical practice. However, factual knowledge of medical science is also essential and ways of achieving a balance are discussed. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.
Güereque, M.; Pennington, D. D.; Pierce, S. A.
High-volume heterogeneous datasets are becoming ubiquitous, migrating to center stage over the last ten years and transcending the boundaries of computationally intensive disciplines into the mainstream, becoming a fundamental part of every science discipline. Despite the fact that large datasets are now pervasive across industries and academic disciplines, the array of skills is generally absent from earth science programs. This has left the bulk of the student population without access to curricula that systematically teach appropriate intelligent-systems skills, creating a void for skill sets that should be universal given their need and marketability. While some guidance regarding appropriate computational thinking and pedagogy is appearing, there exist few examples where these have been specifically designed and tested within the earth science domain. Furthermore, best practices from learning science have not yet been widely tested for developing intelligent systems-thinking skills. This research developed and tested evidence based computational skill modules that target this deficit with the intention of informing the earth science community as it continues to incorporate intelligent systems techniques and reasoning into its research and classrooms.
Full Text Available Current reflective practices in the social studies are examined in light of how these strategies can add value and meaning to social studies curriculums. Many of these reflective practices were introduced within teacher education programs’ social studies methods courses, to expose pre-service teachers to innovative teaching practices that could be used in the classroom. An ineffective textbook-centered curriculum has dominated education in the United States for over a century. The researchers in this article argue for a new, reflective approach to teaching history and social studies curricula. New pedagogical models are needed to revive an ailing social studies program in the public school system. This article includes a selective examination of some traditional and non-traditional methods for promoting student learning and growth through reflective practices. Those considered in this article include dialogue journals, textbooks, culturally responsive texts (CRT, the Persona Doll Project, mask-making, primary source documents, and co-teaching. Each reflective practice strategy has its merits and could be easily implemented to improve pedagogical practice.
Full Text Available There is ample evidence that technology-enhanced instruction could result in students’ learning. With the advancement and ever-increasing growth of technology, the use of educational electronic games or computer games in education has appealed to both educators and students. Because of their potential to enhance students’ interest, motivation and creativity, computer games can be used to teach various skills and strategies to different types of students, particularly schoolchildren. These games have also made inroads into language learning classrooms as they provide language learners with a rich learning context to engage in authentic and meaningful learning experiences. This paper reviews the potential of integrating computer games into second/foreign language syllabi and curricula by offering a synopsis of the assumptions, prior studies and theoretical background in support of these games in language education. At the end, the paper touches upon the role of teachers and the likely inhibiting factors affecting the integration of computer games into English language programs.
Honeycutt, Karen; Latshaw, Sandra
Good communication and critical thinking are essential skills for all successful professionals, including Clinical Laboratory Science/Medical Laboratory Science (CLS/MLS) practitioners. Professional programs can incorporate writing assignments into their curricula to improve student written communication and critical thinking skills. Clearly defined, scenario-focused writing assignments provide student practice in clearly articulating responses to proposed problems or situations, researching and utilizing informational resources, and applying and synthesizing relevant information. Assessment rubrics, structured feedback, and revision writing methodologies help guide students through the writing process. This article describes how a CLS Program in a public academic medical center, located in the central United States (US) serving five centrally-located US states has incorporated writing intensive assignments into an existing 11-month academic year using formal, informal and reflective writing to improve student written communication and critical thinking skills. Faculty members and employers of graduates assert that incorporating writing intensive requirements have better prepared students for their professional role to effectively communicate and think critically.
Smith, Val H.; Rubinstein, Rebecca J.; Park, Serry; Kelly, Libusha; Klepac-Ceraj, Vanja
Despite the impact of the human microbiome on health, an appreciation of microbial ecology is yet to be translated into mainstream medical training and practice. The human microbiota plays a role in the development of the immune system, in the development and function of the brain, in digestion, and in host defense, and we anticipate that many more functions are yet to be discovered. We argue here that without formal exposure to microbiology and ecology—fields that explore the networks, interactions and dynamics between members of populations of microbes—vitally important links between the human microbiome and health will be overlooked. This educational shortfall has significant downstream effects on patient care and biomedical research, and we provide examples from current research highlighting the influence of the microbiome on human health. We conclude that formally incorporating microbiology and ecology into the premedical curricula is invaluable to the training of future health professionals and critical to the development of novel therapeutics and treatment practices. PMID:26198190
Jørgensen, Ulrik; Brodersen, Søsser
practice. Consequently courses added into engineering curricula emphasizing contextual issues stay in stark contrast to the dominant instrumental disciplines of mathematics and techno-science content of core engineering courses. Based on several years of teaching and experimenting with Theory of Science...
The discipline of nuclear engineering is described, giving some historical background to explain the structure of the curricula commonly found in nuclear engineering programs in the U.S. Typical curricula are described, along with a specific example given by the University of Michigan undergraduate program in nuclear engineering. The National Academy of Sciences report on U.S. nuclear engineering education is summarized, and the major findings are presented, including data on the number of programs, number of degrees, and enrollment trends. Some discussion is made of manpower trends and the degree to which nuclear programs can supply nuclear engineers to meet the anticipated demands of the current decade and into the next century. (author) 12 refs.; 2 figs.; 4 tabs
Louie, Angelique; Izatt, Joseph; Ferrara, Katherine
We present an overview of graduate programs in biomedical imaging that are currently available in the US. Special attention is given to the emerging technologies of molecular imaging and biophotonics. Discussions from the workshop on Graduate Imaging at the 2005 Whitaker Educational Summit meeting are summarized.
Lindquist, Gay J.
Results of a national survey of baccalaureate nursing programs are presented concerning programs for study abroad, international exchange programs, and other approaches to internationalizing nursing curricula, including courses dealing with health care and nursing in foreign countries. (Author/MSE)
Malik, Gulzar; McKenna, Lisa; Griffiths, Debra
Adopting evidence-based practice (EBP) principles in undergraduate education can facilitate nursing students' appreciation of EBP. Using grounded theory method, this study aimed to explore processes used by nurse academics while integrating EBP concepts in undergraduate nursing curricula across Australian universities. Twenty-three nurse academics were interviewed and nine were observed during teaching of undergraduate students. In addition, 20 unit/subject guides were analyzed using grounded theory approach of data analysis. The theory " On a path to success: Endeavoring to contextualize curricula within an EBP framework" reflects academics' endeavors toward linking EBP concepts to practice, aiming to contextualize curricula in a manner that engages students within an EBP framework. However, academics' journeys were influenced by several contextual factors which require strategies to accomplish their endeavors. In conclusion, initiatives to minimize barriers, faculty development, and provision of resources across educational and clinical settings are fundamental to achieving undergraduate curricula underpinned by EBP concepts.
Computer Security Team
If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise. An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...
This study, conducted under the auspices of the Energy Engineering Board of the National Research Council, examines the status of and outlook for nuclear engineering education in the United States. The study resulted from a widely felt concern about the downward trends in student enrollments in nuclear engineering, in both graduate and undergraduate programs. Concerns have also been expressed about the declining number of US university nuclear engineering departments and programs, the aging of their faculties, the appropriateness of their curricula and research funding for industry and government needs, the availability of scholarships and research funding, and the increasing ratio of foreign to US graduate students. A fundamental issue is whether the supply of nuclear engineering graduates will be adequate for the future. Although such issues are more general, pertaining to all areas of US science and engineering education, they are especially acute for nuclear engineering education. 30 refs., 12 figs., 20 tabs.
This study, conducted under the auspices of the Energy Engineering Board of the National Research Council, examines the status of and outlook for nuclear engineering education in the United States. The study, as described in this report resulted from a widely felt concern about the downward trends in student enrollments in nuclear engineering, in both graduate and undergraduate programs. Concerns have also been expressed about the declining number of US university nuclear engineering departments and programs, the ageing of their faculties, the appropriateness of their curricula and research funding for industry and government needs, the availability of scholarships and research funding, and the increasing ratio of foreign to US graduate students. A fundamental issue is whether the supply of nuclear engineering graduates will be adequate for the future. Although such issues are more general, pertaining to all areas of US science and engineering education, they are especially acute for nuclear engineering education. 30 refs., 24 figs., 49 tabs
Full Text Available Objective: Conflicts of interests resulting from interactions with pharmaceutical companies are pervasive in medicine and can result in an undue influence on physicians’ decision-making. The objective of this systematic review is to analyze published and scientifically evaluated curricula for medical students and residents regarding such conflicts of interest. We begin by describing the covered topics and teaching methods; afterwards we analyze the quality of the curricula using the published data on their evaluations and comparing the content with content recommended for such curricula.Methods: We searched Pubmed, PsycInfo, EMBASE, OECD, WISO, SOWI and googlescholar up to and including the 5th of September 2016. Publications describing curricula for residents or medical students on the topic of conflicts of interest in medicine and evaluating them for their effects on the participants’ learning were included. We analyzed the covered topics and the teaching methods used and compared them with recommendations by the American Medical Students’ Association (AMSA and Health Action International (HAI. Results: The literature search resulted in 20 publications that fulfilled our search criteria. In five trials, a control group was used, in no trial the participants were randomized to intervention or control group. 16/20 published curricula primarily covered marketing strategies by pharmaceutical companies, especially the interaction with pharmaceutical sales representatives (PSRs. Most curricula only covered a limited number of topics recommended by AMSA/HAI. The most frequent teaching method was a group discussion, which was used in 18/20 curricula; all curricula used at least one interactive teaching method. The evaluation of the curricula was heterogeneous in results as well as design. Some publications described a change of attitudes toward a stronger skepticism regarding interactions with pharmaceutical companies. Four publications
Weißkircher, Janosch; Koch, Cora; Dreimüller, Nadine; Lieb, Klaus
Objective: Conflicts of interests resulting from interactions with pharmaceutical companies are pervasive in medicine and can result in an undue influence on physicians' decision-making. The objective of this systematic review is to analyze published and scientifically evaluated curricula for medical students and residents regarding such conflicts of interest. We begin by describing the covered topics and teaching methods; afterwards we analyze the quality of the curricula using the published data on their evaluations and comparing the content with content recommended for such curricula. Methods: We searched Pubmed, PsycInfo, EMBASE, OECD, WISO, SOWI and googlescholar up to and including the 5th of September 2016. Publications describing curricula for residents or medical students on the topic of conflicts of interest in medicine and evaluating them for their effects on the participants' learning were included. We analyzed the covered topics and the teaching methods used and compared them with recommendations by the American Medical Students' Association (AMSA) and Health Action International (HAI). Results: The literature search resulted in 20 publications that fulfilled our search criteria. In five trials, a control group was used, in no trial the participants were randomized to intervention or control group. 16/20 published curricula primarily covered marketing strategies by pharmaceutical companies, especially the interaction with pharmaceutical sales representatives (PSRs). Most curricula only covered a limited number of topics recommended by AMSA/HAI. The most frequent teaching method was a group discussion, which was used in 18/20 curricula; all curricula used at least one interactive teaching method. The evaluation of the curricula was heterogeneous in results as well as design. Some publications described a change of attitudes toward a stronger skepticism regarding interactions with pharmaceutical companies. Four publications described improved knowledge
Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.
Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...
US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...
Adegoke, Adetoro; Mani, Safiyanu; Abubakar, Aisha; Van Den Broek, Nynke
OBJECTIVE: to assess the level, type and content of pre-service education curricula of health workers providing maternity services against the ICM global standards for Midwifery Education and Essential competencies for midwifery practice. We reviewed the quality and relevance of pre-service education curricula of four cadres of health-care providers of maternity care in Northern Nigeria.\\ud DESIGN AND SETTING: we adapted and used the ICM global standards for Midwifery Education and Essential ...
Jippes, Mariëlle; Majoor, Gerard D
There is an evident misbalance in the frequency of medical schools with problem-based learning (PBL) curricula in northern versus southern Europe. This study explores the hypothesis that national culture influences the flexibility of (medical) schools in terms of their propensity to adopt integrated and PBL curricula. National culture was defined by a country's scores on indexes for 4 dimensions of culture as described by Hofstede, defined as: power distance; individualism/collectivism; masculinity/femininity, and uncertainty avoidance. Non-integrated medical curricula were defined as those that included courses in 2 of the 3 basic sciences (anatomy, biochemistry and physiology) in the first 2 years; otherwise, by exclusion, curricula were assumed to be integrated. The medical curricula of 134 of the 263 schools in the 17 European countries included in Hofstede's study were examined. Correlations were calculated between the percentage of integrated medical curricula in a country and that country's scores on indexes for each of the 4 dimensions of culture. Significant negative correlations were found between the percentage of integrated curricula and scores on the power distance index (correlation coefficient [CC]: - 0.692; P = 0.002) and the uncertainty avoidance index (CC: - 0.704; P = 0.002). No significant correlations were found between the percentage of integrated curricula and scores on the indexes for individualism/collectivism and masculinity/femininity. A (medical) school which is considering adopting an integrated or PBL curriculum and which is based in a country with a high score on Hofstede's power distance index and/or uncertainty avoidance index must a priori design strategies to reduce or overcome the obstructive effects of these dimensions of culture on the school's organisation.
Robelen, Erik W.
Ten years after terrorists crashed planes into the World Trade Center and the Pentagon, the profound impact on the United States is not hard to see, from heightened domestic-security measures to the U.S. role in conflicts deemed part of a war on terror. What's less obvious is how the attacks have filtered into American classrooms. Some observers…
This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected
Gobeli, Garth W.
Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.
Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.
A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.
Crowe, Elizabeth Coyne; Connor, Carol McDonald; Petscher, Yaacov
Policy changes at the federal and state level are endeavoring to improve student achievement at schools serving children from lower-SES homes. One important strategy is the focus on using evidence-based core reading curricula to provide a consistent framework for instruction across schools. However, rarely have these curricula undergone rigorous comparative testing. Therefore, the purpose of this study was to compare the effects of six core reading curricula on oral reading fluency growth, while appraising whether these effects differ by grade level and for children living in lower socioeconomic (SES) households. Over 30,000 students in first through third grade Florida Reading First classrooms comprise this academically and economically diverse cross-sectional. Hierarchical Linear Modeling was used to model latent growth curves for students' reading fluency scores over the school year. Growth curves revealed differences across curricula as well as between students of lower and higher SES, suggesting that reading fluency growth trajectories for curricula varied depending on student SES and grade level. Findings indicate that while there are similarities among curricula, they sometimes differ in their ability to promote reading skill growth. Differences by grade level and SES were also detected. However, many of these differences were small. Implications for the use of curriculum as a conduit for improving reading instruction are discussed.
Bezemer, C.P.; Mesbah, A.; Van Deursen, A.
This paper is a pre-print of: Cor-Paul Bezemer, Ali Mesbah, and Arie van Deursen. Automated Security Testing of Web Widget Interactions. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering
Full Text Available Contemporary curricula of preschool education are the result of the improvement of pedagogical and didactic theories. They imply a technical plan with which it is possible to achieve measurable objectives of preschool education. The curriculum is also defined as a tool for quality and equal education for all. It represents a reflection of the time, society and culture in which it exists, but also a model for future society and education. Thus an important research question arises as to what extent we recognize traditional ideas about learning and the development of a preschool child in contemporary preschool programs. Are traditional ideas about educating young children unjustly neglected or do we recognize them in contemporary pedagogical theory even today, at the same time forgetting about the past and declaring them innovations? This paper deals with the starting points for the development of a curriculum. The goal of the research was to determine to what extent can the starting points for the development of preschool children, which have existed in the first preschool programs in Serbia in the late 19th century, be recognized in contemporary preschool programs. A descriptive method was applied as well as a procedure for content analysis of program documents. Research results confirm that the elements of the first preschool programs, which remain relevant until today, can be recognized in contemporary preschool programs. They are related to target orientations, principles and functions of preschool education. However, these ideas are defined as contemporary tendencies, and the fact that they existed in preschool programs that were developed a long time ago is unjustly ignored.
Caramiciu, Justin; Arcella, David; Desai, Manisha S
To determine the extent to which the history of medicine (HOM) and its related topics are included within the curriculum of accredited medical schools in the United States. Survey instrument. US allopathic medical schools. An online survey was sent to officials from every medical school in the US. Respondents were asked to provide institutional identifiers, the presence of an HOM elective offered to medical students, the years during which the elective is offered, the existence of an HOM department, and the contact information for that particular department. Nonresponders were contacted by phone to elicit the same information. History of medicine electives included didactic sessions and seminars with varying degrees of credit offered in different years of medical school. Based on responses from 119 of 121 contacted medical schools (98%), 45 (37%) included formal lectures or weekly seminars in the medical school curriculum. Five (11%) curricula had or have required HOM, whereas 89% offered elective HOM instruction. Course duration and credit awarded varied. Eighteen (15%) medical schools included departments dedicated to HOM. Providing education in HOM was limited by faculty interest, clinical training hours, and low interest. Data collected by our study suggest that substantial barriers exist within the academic medical community towards a wider acceptance of the importance of HOM. Causes for such lack of interest include absence of questions on written or oral tests related to HOM, difficulty in publishing articles related to HOM in peer reviewed journals, near absence of research grants in HOM, difficulty in getting academic promotions or recognition for activities related to HOM, and a lack of support from academic chairpersons for activities related to HOM. Copyright © 2015 Anesthesia History Association. Published by Elsevier Inc. All rights reserved.
Hwang, Jung Eun; Kim, Na Jin; Song, Meiying; Cui, Yinji; Kim, Eun Ju; Park, In Ae; Lee, Hye In; Gong, Hye Jin; Kim, Su Young
In an integrated curriculum, multiple instructors take part in a course in the form of team teaching. Accordingly, medical schools strive to manage each course run by numerous instructors. As part of the curriculum management, course evaluation is conducted, but a single, retrospective course evaluation does not comprehensively capture student perception of classes by different instructors. This study aimed to demonstrate the need for individual class evaluation, and further to identify teaching characteristics that instructors need to keep in mind when preparing classes. From 2014 to 2015, students at one medical school left comments on evaluation forms after each class. Courses were also assessed after each course. Their comments were categorized by connotation (positive or negative) and by subject. Within each subject category, test scores were compared between positively and negatively mentioned classes. The Mann-Whitney U test was performed to test group differences in scores. The same method was applied to the course evaluation data. Test results for course evaluation showed group difference only in the practice/participation category. However, test results for individual class evaluation showed group differences in six categories: difficulty, main points, attitude, media/contents, interest, and materials. That is, the test scores of classes positively mentioned in six domains were significantly higher than those of negatively mentioned classes. It was proved that individual class evaluation is needed to manage multi-instructor courses in integrated curricula of medical schools. Based on the students' extensive feedback, we identified teaching characteristics statistically related to academic achievement. School authorities can utilize these findings to encourage instructors to develop effective teaching characteristics in class preparation.
Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the
The principle of Process Inherent Ultimate Safety (PIUS) is a new approach to Light Water Reactor (LWR) safety that could represent a solution to the present problems of public distrust, regulatory maze and plant design complexity plaguing the nuclear industry in many countries. A unique thermohydraulic design of the primary system ensures core integrity, and thereby gurarantees freedom from significant releases of radioactive matter, in all credible emergencies. This is accomplished entirely without reliance on potentially failure prone engineered safety systems and with immunity to operator mistskes. The potential for human fallibility to cause accidents is thereby drastically reduced in an easily understood way. Plant design can be greatly simplified because redundant, diverse safety systems are no longer needed. The paper briefly describes the PIUS design principle and the two SECURE reactor designs based on it, i.e. SECURE-H for district heating and process steam and SECURE-P (usually known simply as PIUS) for electric power generation. Demonstration of simulated system over-all thermohydraulic function and transient response in a large electrically heated test loop is described and results from some component development work is given. (author)
Grant, Malcolm Alister
As nations alike struggle to diversify and secure their power portfolios, geothermal energy, the essentially limitless heat emanating from the earth itself, is being harnessed at an unprecedented rate. For the last 25 years, engineers around the world tasked with taming this raw power have used Geothermal Reservoir Engineering as both a training manual and a professional reference. This long-awaited second edition of Geothermal Reservoir Engineering is a practical guide to the issues and tasks geothermal engineers encounter in the course of their daily jobs. The bo
Wilhelmsen, Cheryl A.; Dixon, Raymond A.
This study ranked constructs articulated by Childress and Rhodes (2008) and identified the key indicators for each construct as a starting point to explore what should be included on an instrument to measure the engineering design process and outcomes of students in high schools that use the PLTW and EbDTM curricula in Idaho. A case-study design…
McConville, Jennifer R.; Rauch, Sebastien; Helgegren, Ida; Kain, Jaan-Henrik
Purpose: In today's complex society, there is an increasing demand to include a wider set of skills in engineering curricula, especially skills related to policy, society and sustainable development. Role-playing and gaming are active learning tools, which are useful for learning relationships between technology and society, problem solving in…
Semken, S. C.
Bundling is the process of grouping Performance Expectations (PEs) from the Next Generation Science Standards (NGSS) into coherent units based on a defined topic, idea, question, or phenomenon. Bundling sorts the PEs for a given grade or grade band into a teachable narrative: a key stage in building curriculum, instruction, and assessment from the NGSS. To encourage and facilitate this, bundling guidelines have recently been released on the NGSS website (nextgenscience.org/glossary/bundlesbundling), and example bundles for different grade bands and disciplines are also being developed and posted there. According to these guidelines the iterative process of bundling begins with organization of PEs according to natural connections among them, and alignment of the three NGSS dimensions (Disciplinary Core Ideas, Cross-Cutting Concepts, and Science and Engineering Practices) that underpin each PE. Bundles are grouped by coherence and increasing complexity into courses, and courses into course sets that should encompass all PEs for a grade band. Bundling offers a natural way to translate the NGSS into highly contextualized curricula such as place-based (PB) teaching, which is situated in specific places or regions and focused on natural and cultural features, processes, phenomena, history, and challenges to sustainability therein. Attributes of place and our individual and collective connections to place (sense of place) directly inform PB curriculum, pedagogy, and assessment. PEs can be bundled by their relevance to these themes. Following the NGSS guidelines, I model the process for PB instruction by bundling PEs around the themes of Paleozoic geology and carbonate deposition and their relationships to mining and calcining of limestone in Anthropocene cement production for developing communities. The bundles integrate aspects of Earth history, the carbon cycle, mineral resources, climate change, and sustainability using specific local examples and narratives. They are
Pinter, S.; Carlson, S. J.
The Next Generation Science Standards is an initiative, adopted by 26 states, to set national education standards that are "rich in content and practice, arranged in a coherent manner across disciplines and grades to provide all students an internationally benchmarked science education." Educators now must integrate these standards into existing curricula. Many grade-school (K-6) teachers face a particularly daunting task, as they were traditionally not required to teach science or only at a rudimentary level. The majority of K-6 teachers enter teaching from non-science disciplines, making this transition even more difficult. Since the NGSS emphasizes integrated and coherent progression of knowledge from grade to grade, prospective K-6 teachers must be able to deliver science with confidence and enthusiasm to their students. CalTeach/MAST (Mathematics and Science Teaching Program) at the University of California Davis, has created a two-quarter sequence of integrated science courses for undergraduate students majoring in non-STEM disciplines and intending to pursue multiple-subject K-6 credentials. The UCD integrated science course provides future primary school teachers with a basic, but comprehensive background in the physical and earth/space sciences. Key tools are taught for improving teaching methods, investigating complex science ideas, and solving problems relevant to students' life experiences that require scientific or technological knowledge. This approach allows prospective K-6 teachers to explore more effectively the connections between the disciplinary core ideas, crosscutting concepts, and scientific and engineering practices, as outlined in the NGSS. In addition, they develop a core set of science teaching skills based on inquiry activities and guided lab discussions. With this course, we deliver a solid science background to prospective K-6 teachers and facilitate their ability to teach science following the standards as articulated in the NGSS.
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary. (2...
... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...
... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...
National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.
Liebenberg, Leon; Mathews, Edward Henry
Modern engineering curricula have started to emphasize design, mostly in the form of design-build experiences. Apart from instilling important problem-solving skills, such pedagogical frameworks address the critical social skill aspects of engineering education due to their team-based, project-based nature. However, it is required of the…
Phelps, L. Allen; Camburn, Eric M.; Min, Sookweon
Despite the recent policy proclamations urging state and local educators to implement integrated science, technology, engineering, and mathematics (STEM) curricula, relatively little is known about the role and impact of pre-college engineering courses within these initiatives. When combined with appropriate mathematics and science courses, high…
Henning, Klaus; Bornefeld, Gero; Brall, Stefan
This paper offers a multi-perspective view on engineering education at RWTH Aachen University: curriculum design, examples of newly developed teaching methods for engineering curricula, and teaching competencies and teacher qualification. It is based on the theories of student-centred learning, project learning, social skills, etc., but the paper…
Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)
For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.
Blaser, Tammy M.
Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines
Soneji, Samir; King, Gary
The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.
Hepburn, Larry; Shin, Masako
This document, one of eight in a multi-cultural competency-based vocational/technical curricula series, is on food service. This program is designed to run 24 weeks and cover 15 instructional areas: orientation, sanitation, management/planning, preparing food for cooking, preparing beverages, cooking eggs, cooking meat, cooking vegetables,…
Thomas, Roger E; McLellan, Julie; Perera, Rafael
To assess effectiveness of school-based smoking prevention curricula keeping children never-smokers. Systematic review, meta-analysis. MEDLINE (1966+), EMBASE (1974+), Cinahl, PsycINFO (1967+), ERIC (1982+), Cochrane CENTRAL, Health Star, Dissertation Abstracts, conference proceedings. pooled analyses, fixed-effects models, adjusted ORs. Risk of bias assessed with Cochrane Risk of Bias tool. 50 randomised controlled trials (RCTs) of school-based smoking curricula. Never-smokers age 5-18 (n=143,495); follow-up ≥6 months; all countries; no date/language limitations. Information, social influences, social competence, combined social influences/competence and multimodal curricula. Remaining a never-smoker at follow-up. Pooling all curricula, trials with follow-up ≤1 year showed no statistically significant differences compared with controls (OR 0.91 (0.82 to 1.01)), though trials of combined social competence/social influences curricula had a significant effect on smoking prevention (7 trials, OR 0.59 (95% CI 0.41 to 0.85)). Pooling all trials with longest follow-up showed an overall significant effect in favour of the interventions (OR 0.88 (0.82 to 0.95)), as did the social competence (OR 0.65 (0.43 to 0.96)) and combined social competence/social influences curricula (OR 0.60 (0.43 to 0.83)). No effect for information, social influences or multimodal curricula. Principal findings were not sensitive to inclusion of booster sessions in curricula or to whether they were peer-led or adult-led. Differentiation into tobacco-only or multifocal curricula had a similar effect on the primary findings. Few trials assessed outcomes by gender: there were significant effects for females at both follow-up periods, but not for males. RCTs of baseline never-smokers at longest follow-up found an overall significant effect with average 12% reduction in starting smoking compared with controls, but no effect for all trials pooled at ≤1 year. However, combined social
Wylie, Ann; Furmedge, Daniel S; Appleton, Amber; Toop, Helen; Coats, Tom
The study aimed to firstly provide a small self-selecting group of medical students with the opportunity to explore current approaches and opportunities addressing the prevention of childhood obesity and, secondly, to consider what aspects could be part of the taught curriculum. Medical students in their third and fourth year were invited to self-design special study modules (SSMs) exploring interventions and processes addressing the growing concern about childhood obesity. One student looked at the role of the primary care teams, two looked at community-based opportunities to improve physical activity in urban areas where there is significant deprivation and one student explored the complex role of the media as a social determinant of dietary patterns and sedentary behaviour. Primary care health professionals questioned their role in regard to raising the topic of obesity in the consultation and had limited awareness of current NICE guidelines and local interventions for referral. Local authority physical activity programmes have an important role in preventing and tackling obesity and although the media are regulated, there is limited impact on reducing obesity. Conversely, the influence of the media is complex and enables medical students and teachers to be aware of some of the social determinants influencing health-related behaviour. About a third of UK GP practices have some role in medical undergraduate education. It will therefore be inevitable that students will encounter GPs working with prevention and management of childhood obesity, however limited, and this will increasingly be part of the teaching agenda, whether formal and planned or opportunistic. Curricula could include being familiar with the evidence that informs NICE guidelines, observing these guidelines being implemented and their limitations, awareness of local schemes for referral to prevent or treat obesity and the influence of wider determinants on diet and physical activity behaviour
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying
Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...
Pale, Paulino Calderón
If you want to learn to write your own scripts for the Nmap Scripting Engine, this is the book for you. It is perfect for network administrators, information security professionals, and even Internet enthusiasts who are familiar with Nmap.
Fisher, Rebecca A; Dasgupta, Prokar; Mottrie, Alex; Volpe, Alessandro; Khan, Mohammed S; Challacombe, Ben; Ahmed, Kamran
Robotic surgery is a rapidly expanding field. Thus far training for robotic techniques has been unstructured and the requirements are variable across various regions. Several projects are currently underway to develop a robotic surgery curriculum and are in various stages of validation. We aimed to outline the structures of available curricula, their process of development, validation status and current utilization. We undertook a literature review of papers including the MeSH terms "Robotics" and "Education". When we had an overview of curricula in development, we searched recent conference abstracts to gain up to date information. The main curricula are the FRS, the FSRS, the Canadian BSTC and the ERUS initiative. They are in various stages of validation and offer a mixture of theoretical and practical training, using both physical and simulated models. Whilst the FSRS is based on tasks on the RoSS virtual reality simulator, FRS and BSTC are designed for use on simulators and the robot itself. The ERUS curricula benefits from a combination of dry lab, wet lab and virtual reality components, which may allow skills to be more transferable to the OR as tasks are completed in several formats. Finally, the ERUS curricula includes the OR modular training programme as table assistant and console surgeon. Curricula are a crucial step in global standardisation of training and certification of surgeons for robotic surgical procedures. Many curricula are in early stages of development and more work is needed in development and validation of these programmes before training can be standardised. Copyright © 2014 Surgical Associates Ltd. Published by Elsevier Ltd. All rights reserved.
Robin E. Miller
plagiarizing and mitigates the need for punitive plagiarism education programs. In discussing the challenges and implementation of plagiarism awareness curricula, the authors contribute to the dialogue about effective approaches to addressing this critical issue in higher education.
Gilutz, S.; Bekker, M.M.; Fisch, S.; Blikstein, Paulo
This one-day workshop will bring together instructors who teach Interaction Design & Children at a university level from a wide spectrum of disciplines and research communities (HCI, Engineering, Design, education, Psychology and Communications). Our goal is to explore the various current ways IDC
Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema
This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...
Frimpong Twum; Kwaku Ahenkora
Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...
Full Text Available Internet information traffic becomes greater and moreimportant. With increasing growth of information importancerequirement for its security becomes indispensable. Theinformation security problem especially affect large and smallcompanies whose prosperity is depending on Internet presence.This affecting the three areas of Internet commerce: credit cardtransactions, virtual private networks and digital certification.To ensure information traffic it is necessary to find a solution,in a proper way, for three major problems: frontier problem,market problem and government problem. While the eventualemergence of security standards for Internet transactions isexpected, it will not automatically result in secure Internettransactions. In future, there is a wealth of security issues thatwill continue to require attention: internal security, continuedhacking, social engineering, malicious code, reliability andperformance, skills shortages and denial of se1vice attacks.
Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. This book encompases the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can be applied to information security issues. The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection...
Penlington, Roger; Steiner, Simon
This repository of teaching and learning resources is a companion to the 2nd edition of “An Introduction to Sustainable Development in the Engineering Curriculum”, by Roger Penlington and Simon Steiner, originally created by The Higher Education Academy Engineering Subject Centre, Loughborough University. \\ud The purpose of this collection of teaching and learning re-sources is to provide access, with a brief resumé, to materials in curricula reform, recognition awards, and university movemen...
Adegoke, Adetoro A; Mani, Safiyanu; Abubakar, Aisha; van den Broek, Nynke
to assess the level, type and content of pre-service education curricula of health workers providing maternity services against the ICM global standards for Midwifery Education and Essential competencies for midwifery practice. We reviewed the quality and relevance of pre-service education curricula of four cadres of health-care providers of maternity care in Northern Nigeria. we adapted and used the ICM global standards for Midwifery Education and Essential competencies for midwifery practice to design a framework of criteria against which we assessed curricula for pre-service training. We reviewed the pre-service curricula for Nurses, Midwives, Community Health Extension Workers (CHEW) and Junior Community Health Extension Workers (JCHEW) in three states. Criteria against which the curricula were evaluated include: minimum entry requirement, the length of the programme, theory: practice ratio, curriculum model, minimum number of births conducted during training, clinical experience, competencies, maximum number of students allowable and proportion of Maternal, Newborn and Child Health components (MNCH) as part of the total curriculum. four pre-service education programmes were reviewed; the 3 year basic midwifery, 3 year basic nursing, 3 year Community Health Extension Worker (CHEW) and 2 year Junior Community Health Extension Worker (JCHEW) programme. Findings showed that, none of these four training curricula met all the standards. The basic midwifery curriculum most closely met the standards and competencies set out. The nursing curriculum showed a strong focus on foundations of nursing practice, theories of nursing, public health and maternal newborn and child health. This includes well-defined modules on family health which are undertaken from the first year to the third year of the programme. The CHEW and JCHEW curricula are currently inadequate with regard to training health-care workers to be skilled birth attendants. although the midwifery curriculum
When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)
Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)
When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)
Cheng, Huai Yong; Davis, Molly
Prior reviews of geriatrics curricula for internal medicine (IM) and family medicine (FM) residents have not evaluated study quality or assessed learning objectives or specific IM or FM competencies. This review of geriatrics curricula for IM and FM residents seeks to answer 3 questions: (1) What types of learning outcomes were measured? (2) How were learning outcomes measured? and (3) What was the quality of the studies? We evaluated geriatrics curricula that reported learning objectives or competencies, teaching methods, and learning outcomes, and those that used a comparative design. We searched PubMed and 4 other data sets from 2003-2015, and assessed learning outcomes, outcome measures, and the quality of studies using the Medical Education Research Study Quality Instrument (MERSQI) and Best Evidence Medical Education (BEME) methods. Fourteen studies met inclusion criteria. Most curricula were intended for IM residents in the inpatient setting; only 1 was solely dedicated to FM residents. Median duration was 1 month, and minimum geriatrics competencies covered were 4. Learning outcomes ranged from Kirkpatrick levels 1 to 3. Studies that reported effect size showed a considerable impact on attitudes and knowledge, mainly via pretests and posttests. The mean MERSQI score was 10.5 (range, 8.5-13) on a scale of 5 (lowest quality) to 18 (highest quality). Few geriatrics curricula for IM and FM residents that included learning outcome assessments were published recently. Overall, changes in attitudes and knowledge were sizeable, but reporting was limited to low to moderate Kirkpatrick levels. Study quality was moderate.
Paul, David; Ewen, Shaun C; Jones, Rhys
The concept of cultural competence has become reified by inclusion as an accreditation standard in the US and Canada, in New Zealand it is demanded through an Act of Parliament, and it pervades discussion in Australian medical education discourse. However, there is evidence that medical graduates feel poorly prepared to deliver cross-cultural care (Weissman et al. in J Am Med Assoc 294(9):1058-1067, 2005) and many commentators have questioned the effectiveness of cultural competence curricula. In this paper we apply Hafferty's taxonomy of curricula, the formal, informal and hidden curriculum (Hafferty in Acad Med 73(4):403-407, 1998), to cultural competence. Using an example across each of these curricular domains, we highlight the need for curricular congruence to support cultural competence development among learners. We argue that much of the focus on cultural competence has been in the realm of formal curricula, with existing informal and hidden curricula which may be at odds with the formal curriculum. The focus of the formal, informal and hidden curriculum, we contend, should be to address disparities in health care outcomes. In conclusion, we suggest that without congruence between formal, informal and hidden curricula, approaches to addressing disparity in health care outcomes in medical education may continue to represent reform without change.
Bouchard, J.; Deffain, J.P.; Gouchet, A.
This book is an introductory course to the technology of nuclear reactors, it is based on lectures given to students engaged in nuclear engineering curricula. A brief historical account of nuclear power is given in which Three Miles Island and Chernobyl accidents appear to be the main milestones because of their big impacts on the way to apprehend the safety in the design of a reactor for the first and on the public controversy of nuclear energy for the second. All the concepts and knowledge required to understand the design of a reactor and how it operates, are described: radioactivity, nuclear safety, irradiation effects on materials, uranium enrichment, reactor kinetics, fission products poisoning,... This book is made up of 4 parts: 1) nuclear power, 2) types of power nuclear reactors (PWR, BWR and fast reactors), 3) the fuel cycle, and 4) neutronics basics. (A.C.)
Spies von Buellesheim.
The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de
Estévez-Ayres, Iria; Alario-Hoyos, Carlos; Pérez-Sanagustín, Mar; Pardo, Abelardo; Crespo-García, Raquel M.; Leony, Derick; Parada G., Hugo A.; Delgado-Kloos, Carlos
In the last decade, engineering education has evolved in many ways to meet society demands. Universities offer more flexible curricula and put a lot of effort on the acquisition of professional engineering skills by the students. In many universities, the courses in the first years of different engineering degrees share program and objectives,…
Peltier, Thomas R
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...
Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.
Giorgini, P.; Massacci, F.; Mylopoulos, J.; Zannone, N.
A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizational level, as opposed to an IT system level, and mapping these into security and trust management policies is still an open
Computer Security Team
Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy? In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...
VRUSHALI P PANHALE
Full Text Available Introduction: Evidence-based practice (EBP is the conscientious, explicit and judicious use of the current evidence in clinical decision making. The physiotherapy profession has expressed a commitment to the development and use of evidence. However, very little is known about the extent to which EBP is integrated in physiotherapy curricula in India. The purpose of this study was to describe integration of EBP in Indian physiotherapy programs. Methods: An observational study was conducted where a review of curricula of all Health Science Universities (HSU in India, offering an undergraduate (UG and post-graduate (PG degree program in physical therapy was conducted using a data abstraction sheet. It gathered data on inclusion of research components of EBP in the curricula, content and hours of teaching EBP, and assessment methods. Data were analyzed descriptively. Results: Curricula of fifteen HSU offering physiotherapy programs were reviewed. Contents relevant to EBP were incorporated from the 2nd yr to final year. Common courses included research methodology (84.61%, research project (69.23% and clinical management subjects (57.14%. No guidelines were given about adopting EBP in clinical practice. Didactic lectures were the mode of teaching (81.81%. Preferred method for assessing research projects was viva (44.44%. Critical appraisal was least included in the entry level education. Contents relevant to all the five steps of EBP were included in PG curricula. Conclusions: Though physiotherapy programs are introducing EBP teaching at the entry level, it lacks structured systematic approach and is fragmented. There is inadequate emphasis on clinical oriented teaching of EBP and assessment methods. Moreover, there is adequate coverage of EBP content in PG curricula.
Clements, Matthew B; Morrison, Kasey Y; Schenkman, Noah S
Medical simulation offers the advantage of improving resident skill and comfort without impacting patient care. Five years ago, we identified trends in the use of robotic and laparoscopic simulation in 2008 and 2009 at American urology residency training programs. We seek to identify the changes in the use of simulators and the presence of formal curricula in the wake of technological advances and changes in graduate medical education. Attendees of the American Urological Association (AUA) Basic Sciences Course, mostly in their second or third year of residency, were surveyed on the availability and use of laparoscopic/robotic simulators at their program, the presence of a formal curriculum, and a Likert scale questionnaire regarding face and content validity. Over a 5-year period, the availability of virtual reality robotic simulators substantially increased from 14% to nearly 60% availability in 2013. Despite this increase, the frequency of simulator use remained unchanged (p = 0.40) and the reported presence of formal curricula decreased from 41% to 34.8%. There was no significant difference in simulator use between residents in programs with or without laparoscopic/robotic curricula (p = 0.95). There was also a decrease in the percentage of residents who felt official laparoscopic curricula (93%-81%) and simulators (82%-74%) should be involved in resident education. In the past 5 years, despite evidence supporting benefits from simulator use and increasing availability, self-reported resident use has remained unchanged and the reporting of presence of laparoscopic/robotic curricula has decreased. With more dedicated investment in formal curricula, residency training programs may receive greater returns on their simulator investments, improve resident skills and comfort, and ultimately improve the quality of patient care.
Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu
The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.
Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.
Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.
Kerrick, Sharon S.; Vincent, Charles D.
This report provides the summary of a project whose purpose was to support the costs of developing a nuclear engineering awareness program, an instruction program for teachers to integrate lessons on nuclear science and technology into their existing curricula, and web sites for the exchange of nuclear engineering career information and classroom materials. The specific objectives of the program were as follows: Objective 1--Increase awareness and interest of nuclear engineering; Objective 2--Instruct Teachers on nuclear topics; Objective 3--Nuclear education programs web-site; Objective 4--Support to university/industry matching grants and reactor sharing; Objective 5--Pilot project; and Objective 6--Nuclear engineering enrollment survey at universities
Nelson, Michael H; Fierke, Kerry K; Sucher, Brandon J; Janke, Kristin K
The importance of emotional intelligence (EI) for effective teamwork and leadership within the workplace is increasingly apparent. As suggested by the 2013 CAPE Outcomes, we recommend that colleges and schools of pharmacy consider EI-related competencies to build self-awareness and professionalism among students. In this Statement, we provide two examples of the introduction of EI into pharmacy curricula. In addition, we provide a 4-phase process based on recommendations developed by EI experts for structuring and planning EI development. Finally, we make 9 recommendations' to inform the process of including EI in pharmacy curricula.
As a part of the long-term strategy to improve computer security at CERN, and especially given the attention focused to CERN by the start-up of the LHC, two additional security measures concerning DNS and Tor will shortly be introduced. These are described in the following texts and will affect only a small number of users. "PHISHING" ATTACKS CONTINUE CERN computer users continue to be subjected to attacks by people trying to infect our machines and obtain passwords and other confidential information by social engineering trickery. Recent examples include an e-mail message sent from "La Poste" entitled "Colis Postal" on 21 August, a fake mail sent from web and mail services on 8 September, and an e-mail purporting to come from Hallmark Cards announcing the arrival of an electronic postcard. However, there are many other examples and there are reports of compromised mail accounts being used for more realistic site-specific phishing attempts. Given the increased publicity rela...
Epting, U; CERN. Geneva. TS Department
System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...
This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...
... its business. ADDRESSES: The meeting will be held at the Department of Homeland Security (DHS... as new developments in systems engineering, cyber-security, knowledge management and how best to... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...
... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...
... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...
... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...
Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.
The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.
Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia
The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...
Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...
... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...
First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.
Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...
Zandvoort, Henk; Børsen, Tom; Deneke, Michael; Bird, Stephanie J
Global society is facing formidable current and future problems that threaten the prospects for justice and peace, sustainability, and the well-being of humanity both now and in the future. Many of these problems are related to science and technology and to how they function in the world. If the social responsibility of scientists and engineers implies a duty to safeguard or promote a peaceful, just and sustainable world society, then science and engineering education should empower students to fulfil this responsibility. The contributions to this special issue present European examples of teaching social responsibility to students in science and engineering, and provide examples and discussion of how this teaching can be promoted, and of obstacles that are encountered. Speaking generally, education aimed at preparing future scientists and engineers for social responsibility is presently very limited and seemingly insufficient in view of the enormous ethical and social problems that are associated with current science and technology. Although many social, political and professional organisations have expressed the need for the provision of teaching for social responsibility, important and persistent barriers stand in the way of its sustained development. What is needed are both bottom-up teaching initiatives from individuals or groups of academic teachers, and top-down support to secure appropriate embedding in the university. Often the latter is lacking or inadequate. Educational policies at the national or international level, such as the Bologna agreements in Europe, can be an opportunity for introducing teaching for social responsibility. However, frequently no or only limited positive effect of such policies can be discerned. Existing accreditation and evaluation mechanisms do not guarantee appropriate attention to teaching for social responsibility, because, in their current form, they provide no guarantee that the curricula pay sufficient attention to
Engineering is a small but growing part of K-12 education. Curricula that use the principles and practices of engineering are providing opportunities for elementary, middle, and high school students to design solutions to problems of immediate practical and societal importance. Professional development programs are showing teachers how to use…
Lawler, James; Iturralde, Val; Goldstein, Allan; Joseph, Anthony
College curricula of engineering and information systems do not afford frequent engagement with individuals with disabilities. The authors of this research study analyzed the benefits of disability films for a community film festival of largely engineering and information systems students and individuals with developmental and intellectual…
Tsao, Yu-Chung; Lin, Shi-Woei
This book is based on the research papers presented during The Institute of Industrial Engineers Asian Conference 2013 held at Taipei in July 2013. It presents information on the most recent and relevant research, theories and practices in industrial and systems engineering. Key topics include: Engineering and Technology Management Engineering Economy and Cost Analysis Engineering Education and Training Facilities Planning and Management Global Manufacturing and Management Human Factors Industrial & Systems Engineering Education Information Processing and Engineering Intelligent Systems Manufacturing Systems Operations Research Production Planning and Control Project Management Quality Control and Management Reliability and Maintenance Engineering Safety, Security and Risk Management Supply Chain Management Systems Modeling and Simulation Large scale complex systems.
Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.
Information Security Maturity Model
To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...
Tanner, M. James
Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...
Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia
This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....
This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.
Stoddard, Jeremy; Hess, Diana
This Fact Sheet reports findings from an ongoing study of the representation of 9/11 and terrorism in curricula, textbooks, and state standards documents. The study was conducted in three stages. The first two stages focused on how supplemental curricula and best-selling social studies textbooks published between 2002-2010 present the events of…
National curricula are being challenged and transformed by the impact of migration and European integration. This paper examines how cultural diversity and Europe are intertwined in geography, history, and citizenship education curricula in Greece, Germany, and England. This question is explored using quantitative and qualitative methods through a…
Thomas, Theda; Wallace, Joy; Allen, Pamela; Clark, Jennifer; Jones, Adrian; Lawrence, Jill; Cole, Bronwyn; Sheridan Burns, Lynette
The introduction of discipline standards in Australia has required a comprehensive rethinking of humanities and social science curricula from first year through to graduation. This paper proposes a model to facilitate academics' engagement with discipline standards and their implication for first-year curricula. The model supports…
Mathews, J T
The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.
Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...
Engineering Education experiences turbulent changes, both from government pressures and from industry demands on readdressing the requirements of graduate capability. Despite vast amounts of engineering literature discussing ‘change’ within the field, engineering curricula still maintains its predominant pedagogic model of dissemination to students as it did in previous decades. Technology Enhanced Learning in education has created new and flexible options in the delivery and assessmen...
Full Text Available Romania occupied a back position in the international tests on Mathematics and Sciences. Teachers stress out that one possible cause of this situation could be finding on the Mathematics and Sciences curricula. This paper presents the results of the comparisons of the Romanian curricula with the curricula promoted by the international testing (PISA 2000, 2003 and 2006, and TIMSS 1995, 1999, 2003, 2007 and the curricula of the countries occupied the first places in these tests. The comparisons underline those curricula approaches, which insure success on these tests and realize the reasons of the lack of success of the Romanian pupils. These results will be presented to the curriculum makers, universities and schools, to identify the specific and transferable competencies of the pupils with success in the above-mentioned disciplines.
Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)
The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale
Uenlue, Kenan; Jovanovic, Igor
The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale
Howard, Doug; Schneier, Bruce
Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine
Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel
This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.
Pilling, G. M.; Waddington, D. J.
The Salters Chemistry courses, context-led curricula for 13-16 and 17-18 year old students, first developed by the Science Education Group at the University of York in the UK, have now been translated and/or adapted in seven other European countries. This paper describes and discusses the different reasons for taking up the courses, the ways in…
Does America needs more welders and fewer philosophers? Community college humanities professors and administrators say it benefits all students, whether liberal arts or career track, to take courses in philosophy, history, political science, language arts, and other liberal arts subjects. And they're developing innovative humanities curricula to…
Tanner, John; Keaty, Anne; Major, Christopher
For decades, faculty in colleges of business who teach various legal courses to business students (hereinafter referred to as legal studies faculty) have been advocates of the need for such law courses in the curricula of their business students. The purpose of this article is to continue the effort to reaffirm business students' need for exposure…
Jansen, Anika; de Grip, Andries; Kriechel, Ben
Building on Lazear's skill weights approach, we study the effect of having more or less heterogeneity in the training curriculum on the demand for and supply of apprentices. Modernizations of training curricula provide us with a quasi-experimental setting as these modernizations can be seen as a
Tso, Mark O M; Goldberg, Morton F; Lee, Andrew G; Selvarajah, Sivaguru; Parrish, Richard K; Zagorski, Zbigniew
To highlight the four International Curricula of Ophthalmic Education developed by the Task Forces of the International Council of Ophthalmology, published in Klinische Monatsblätter für Augenheilkunde in November 2006. A global perspective of developing educational curricula as tools to improve eye care. Review of the experience and conclusions of the four international panels. The Task Force on Resident and Specialist Education developed a curriculum consisting of 15 topics in basic, standard, and advanced levels to provide flexibility of educational programs of the ophthalmic specialist in different locations across the world. The curricula were designed to be an educational tool to stimulate multiple levels of training of the ophthalmic specialist. The Task Force on Ophthalmic Education of Medical Students designed a curriculum covering 11 topics and provides illustrative materials for teachers and students. The Task Force strongly advocates the ophthalmology curriculum to be part of the core program of general medical schools education. The Task Force on Para-ophthalmic Vision Specialist Education developed a curriculum to highlight the importance of a team approach to eye care, consisting of ophthalmic specialists and paraophthalmic personnel to produce maximum efficiency. The Task Force on Continuing Medical Education (CME) designed a curriculum exploring the principles, elements, categories, and administration of CME activities in a variety of topics. These curricula shifted the traditional apprentice system of education to a curriculum-based training program in which goals, expectations, competencies, and technical training are defined to improve eye care worldwide.
Bootsma, Margien C.; Vermeulen, Walter J V; Van Dijk, Jerry; Schot, Paul P.
Sustainable development issues are characterised by their multidisciplinary character, and the fact they are not merely an academic exercise but pertain to real-world problems. Academic sustainable development curricula should therefore not only focus on developing the analytical and research skills
Ibrahim, Haslina; Khambali @ Hambali, Khadijah Mohd; Sintang, Suraya; Senin, Nurhanisah; Shaharud-din, Suhaida; Ahmad, Mahmud; Nor, Mohd Roslan Mohd; Kadir, Nor Adina Abdul
Comparative Religion is seen as an important curricula because it could serve as a mechanism for enhancing cross-cultural religious communication. The authors seek to examine the role of Comparative Religion as an important science for enhancing dialogue skills. Such a communication skill, however, must be developed from both intra- and…