WorldWideScience

Sample records for security force personnel

  1. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  2. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  3. Personnel Security during Joint Operations with Foreign Military Forces

    Science.gov (United States)

    2013-08-01

    century society into the twenty-first century encounters a number of obstacles. Illiteracy and innumeracy rates are high, and repressive social values are...force of more than 4,500 British soldiers dispatched by the governor of India . Shortly thereafter, British imperialism prompted two more Anglo-Afghan...socialist change on a traditional society, in part by redistributing land and bringing more women into government. The at- tempt at rapid modernization

  4. Employment of security personnel

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. In his comments, W. Hunold accedes to the court's decision and discusses the underlying reasons of this decision and of a previous ruling in the same matter by putting emphasis on the difference between a contract for services and a contract for work, and a contract for temporary employment. The author also discusses the basic features of an employment contract. (orig./HP) [de

  5. Contribution of Security Forces Personnel to Deter Migration and Improve Stability in West Africa

    Science.gov (United States)

    2017-06-09

    response, cybersecurity analyst, chemical facility inspector, and others.19 Limitations There are several limitations to this research. The time...basins and artificial lakes. This is one of the greatest achievements because agriculture represents one of the main economic activities of the...on intelligence to fill the gap in personnel. However, due to the level of poverty, human intelligence assets are the most preferred. Therefore, in

  6. Site security personnel training manual

    International Nuclear Information System (INIS)

    1978-10-01

    As required by 10 CFR Part 73, this training manual provides guidance to assist licensees in the development of security personnel training and qualifications programs. The information contained in the manual typifies the level and scope of training for personnel assigned to perform security related tasks and job duties associated with the protection of nuclear fuel cycle facilities and nuclear power reactors

  7. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  8. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  9. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Brown, C.H.

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs

  10. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Brown, C.H. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs.

  11. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  12. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  13. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E.

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs

  14. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs.

  15. Education and training for security personnel

    International Nuclear Information System (INIS)

    Chida, Toshiya

    2015-01-01

    It is said that Physical Protection (PP) has two purposes. One is to prevent from occurring risks of threat and terrorism and the other is to minimize damages which will be happened in case of unusual conditions or emergency situation. To achieve this goal, personnel who perform their duties should have professional knowledge and skills concerning security. However, since newcomers rarely satisfy their knowledge and skill for nuclear security in most cases. Therefore, we have to provide adequate education and training after they joined to our company. To this end, our company, located in Aomori Prefecture focused on security and physical protection for nuclear related facilities. In this paper, personnel training and challenges in order to bring up security personnel at our company will be introduced. (author)

  16. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume contains the student guide. It contains the introduction to the course, terrorism, field search and restraints, criminal procedures, introduction to criminal law, offenses against persons and property, rules of conduct, use of force, firearms qualification course, self defense, arrest authority, civil liability, report writing, stress, and tactics

  17. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's guide, covering physical exercise, terrorism, field search and restraint, criminals procedures, introduction to criminal law, offenses against property, rules of conduct, use of force, firearms qualification, self defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  18. 32 CFR 154.42 - Evaluation of personnel security information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  19. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  20. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  1. Investigation of Shift Work Disorders among Security Personnel

    OpenAIRE

    Zahra Zamanian; Mansooreh Dehghani; Heidar Mohammady; Mohammadtaghi Rezaeiani; Hadi Daneshmandi

    2012-01-01

    In today’s advanced world resulting from the improvement of technology, societies tend to encounter a large number of problems and accidents. As we know, university’s security personnel are classified as shift workers and are exposed to health disturbing factors. The aim of this study was investigation of shiftwork disorders among security personnel of the hospitals Affiliated to Shiraz University of Medical Sciences, Central. This case-control study was conducted among 130 security personnel...

  2. Basic legal provisions concerning the activities of industrial security personnel

    International Nuclear Information System (INIS)

    Eberstein, H.H.

    1980-01-01

    The author confines himself to sabotage and espionage. Necessary counter-measures are determined by the respective type of activities. Sect. 618 of the German Civil Code and Sect. 120 a of the Industrial Code give basic legal provisions for the protection of industrial personnel. The legal position held by owner or occupant forms the legal basis for 'vulnerable point protection'. The owner's rights are assigned to the industrial police and are exercised in correspondence with the service or employment contract set up according to Sect. 611 and the following sections of the German Civil Code. Outside guards work according to the performance contract given int the Sections 675, 611, 631 of the German Civil Code. The security personnel has the common right of self-help: self-defence, civil rights concerning the state of national emergency and self-defence under criminal law, rights derived from ownership and property. The author critically argues views held by Mr. Hoffmann-Riem who thinks that police powers have been assigned to private persons. He definitely answers in the negative to the execution of, or encroachment on, sovereign (police) powers by industrial security personnel. A special legal regulation is not necessary, since private protection in form of professional selfdefence is admissible under the law in force. (HSCH) [de

  3. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  4. Improving Mental Health Reporting Practices in Between Personnel Security Investigations

    Science.gov (United States)

    2017-06-01

    derogatory information, unfavorable administrative actions, and adverse actions to the appropriate personnel security, human resources , and...national security clearance? What type of clearances do people typically have (e.g., Secret, Top Secret, TS/SCI, SAP , etc.)? (2) Does [the

  5. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  6. Security personnel training using a computer-based game

    International Nuclear Information System (INIS)

    Ralph, J.; Bickner, L.

    1987-01-01

    Security personnel training is an integral part of a total physical security program, and is essential in enabling security personnel to perform their function effectively. Several training tools are currently available for use by security supervisors, including: textbook study, classroom instruction, and live simulations. However, due to shortcomings inherent in each of these tools, a need exists for the development of low-cost alternative training methods. This paper discusses one such alternative: a computer-based, game-type security training system. This system would be based on a personal computer with high-resolution graphics. Key features of this system include: a high degree of realism; flexibility in use and maintenance; high trainee motivation; and low cost

  7. Forecasting the Demand for Information Security Personnel

    Directory of Open Access Journals (Sweden)

    Anatoliy Alexandrovich Malyuk

    2016-06-01

    Full Text Available During the formation of information society the problem of determining the demand for IS personnel (DfISP, consisting of IS specialists and IS practitioners, is of particular relevance at present. The goal of the paper is to calculate the demand for IS specialists (DfISS. To achieve it we used the informal heuristic methods and introduced some important indicators for DfISP forecast. As a validation of the conceptual approach proposed we show how to apply it on the regional level of one country on one real-world example. All the reasoning and calculations can be narrowed down to the DfISS forecasting within one corporation or IS professionals of a specific profile.

  8. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  9. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  10. Air Force Integrated Personnel and Pay System (AFIPPS)

    Science.gov (United States)

    2016-03-01

    Technical Guidance to include Information Technolgy (IT) Standards identified in the Technical View One (1) (TV-1) and implementation guidance of GIG...Compliant with Global Information Grid (GIG) Technical Guidance to include Information Technolgy (IT) Standards identified in the Technical View One...2016 Major Automated Information System Annual Report Air Force Integrated Personnel and Pay System (AFIPPS) Defense Acquisition Management

  11. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  12. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  13. Air Force Personnel Research: Recommendations for Improved Alignment

    Science.gov (United States)

    2014-01-01

    cornerstone of such work.2 We then used a snowball sampling technique and our knowledge of Air Force personnel research efforts to identify other...importance of this type of data is explained in detail in Chapter Two. 3 Snowball sampling is a technique of using new information collected during a...that the text includes information regarding some organizations we discovered at the end of our snowball sampling period that we did not pursue

  14. The Methodological Approach to Determining the Level of Formation and Provision of Enterprise Personnel Security

    Directory of Open Access Journals (Sweden)

    Gavkalova Nataliia L.

    2016-11-01

    Full Text Available The aim of the article is to substantiate the methodical approach to determining the level of formation and provision of enterprise personnel security. By analyzing, systematizing and generalizing scientific achievements of many scientists, approaches to the evaluation of personnel security at the enterprise were considered, a set of indices for evaluation of personnel security was defined. There justified the urgency of creating a comprehensive approach to evaluation of personnel security that includes implementation of the following stages: defining a list of indices corresponding to the level of formation and provision of personnel security with the help of the expert evaluation method; calculating integral indices of personnel security for each component and the corresponding level by means of the taxonomic analysis; grouping enterprises by the level of formation and provision of personnel security with the use of the cluster and discriminant analysis. It is found that the implementation of this approach will allow not only determining the level of formation and provision of personnel security at the enterprise, but also developing appropriate recommendations on improving its state. Prospects for further research in this direction are evaluation of conditions for formation and provision of personnel security at the enterprise, which will enable revealing negative destabilizing factors that influence personnel security

  15. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  16. Lack of skilled personnel as threat to HR security of industrial enterprises

    Directory of Open Access Journals (Sweden)

    Ozernikova Tatiana

    2017-01-01

    Full Text Available The article assesses the needs of Russian industrial enterprises for skilled labor. The authors consider deficiency in qualified personnel as a threat to the human resources security of industrial enterprises, and analyze its causes. The study includes the criteria to distinguish highly skilled employees in the labor force (education level, occupation, correspondence of performed work to education, and analysis of the dynamics of their number. It identifies the internal and external factors that have a significant influence on the number of qualified personnel. The external factors include the size of the salary, population growth due to migration, the regional level of the socio-economic development. The applied methods of analysis are single-factor analysis of variance (F-test, multiple regression and descriptive statistics. The analysis is based on the materials of the Russian Federal State Statistics Service, as well as on the Russian Longitudinal Monitoring Survey - Higher School of Economics.

  17. CHANGE@CERN:Task Force 4: Matching personnel to activities

    CERN Multimedia

    2002-01-01

    Our series on the work of the Task Forces moves on to Human Ressources at CERN. Staff mobility and topics related to contract policy were the main personnel issues to be considered by Task Force 4, led by John Ferguson, head of AS Division. The aim, as with the other Task Forces, was to find ways to focus resources on the LHC, and once again the recommendations recognise the opportunity to make constructive changes, in this case in Human Resources policy at CERN. Movement of staff between divisions at CERN has generally not been easy, with 'staff complements' (total numbers) set for each sector (research, accelerator, technical and administration). However, the restructuring of the accelerator sector (proposed by Task Force 5 and already agreed in principle) should allow some staff to move to LHC activities. More generally, Task Force 4 recommends that the Laboratory carries out a review of all activities, at a relatively detailed level, so as to identify the resources required to achieve specific goals (t...

  18. Analysis of Specific Features of International Standards of Personnel Security of an Enterprise

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P.

    2014-03-01

    Full Text Available The article marks out components of personnel security of an enterprise, outlines processes of personnel management, which correspond with conditions of security of life and labour, competent, socially protected professional activity, availability of the acting system of motivation and stimulation, and possibilities for corporate conflicts resolution. The article presents basic standards, rules and legislative acts that regulate ensuring personnel security. It analyses specific features of application of standards with respect to: life security and labour protection culture at an enterprise, including managerial systems and practice, behaviour of personnel at working places and also intellectual component of personnel security, which envisages that personnel has knowledge and competences that assist in achievement of strategic goals of an enterprise.

  19. Improving method for calculating integral index of personnel security of company

    Directory of Open Access Journals (Sweden)

    Chjan Khao Yui

    2016-06-01

    Full Text Available The paper improves the method of calculating the integral index of personnel security of a company. The author has identified four components of personnel security (social and motivational safety, occupational safety, not confliction security, life safety which are characterized by certain indicators. Integral index of personnel security is designed for the enterprises of machine-building sector in Kharkov region, taking into account theweight coefficients j-th component of bj, and weighting factors that determine the degree of contribution of the ith parameter in the integral index aіj as defined by experts.

  20. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  1. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  2. 33 CFR 105.210 - Facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of the...

  3. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Science.gov (United States)

    2010-10-01

    ... information technology (IT) system, as required by the Department of Commerce Security Manual and Department of Commerce Security Program Policy and Minimum Implementation Standards. (b) Insert clause 1352.237... as National Security Contracts that will be performed on or within a Department of Commerce facility...

  4. 49 CFR 1522.121 - Security threat assessments for personnel of TSA-approved validation firms.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for personnel of TSA... FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation... for personnel of TSA-approved validation firms. Each of the following must successfully complete a...

  5. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    Science.gov (United States)

    2013-11-12

    to capture and transmit fingerprints . • Accurate Biometrics , a commercial Livescan fingerprinting provider, also received fingerprints electronically...FOUO). Monterey, CA: Defense Personnel Security Research Center. Herbig, K. L. (2008). Changes in espionage by American citizens , 1947-2007. (Tech...by American citizens , 1947-2001. (Tech. Rep. 02-05). Monterey, CA: Defense Personnel Security Research Center. Heuer, Jr., R. J., Crawford, K. S

  6. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  7. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  8. 76 FR 5232 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-01-28

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  9. 75 FR 77934 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-12-14

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the second meeting of the Small Business Information Security...

  10. 75 FR 70764 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-11-18

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the first meeting of the Small Business Information Security...

  11. 76 FR 11307 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-03-01

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  12. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  13. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  14. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  15. A Health-Risk Appraisal of Naval Special Operations Forces Personnel Executive Summary

    National Research Council Canada - National Science Library

    Johnson, K

    2000-01-01

    The relationship between exposure to extreme physical and mental activities and adverse environments to the susceptibility to injuries, disease, and death has not been examined for Special Operations Forces (SOF) personnel...

  16. The laser Megajoule facility personnel security and safety interlocks

    International Nuclear Information System (INIS)

    Chapuis, J.C.; Arnoul, J.P.; Hurst, A.; Manson, M.

    2012-01-01

    The LMJ (Laser Megajoule) is designed to deliver about 1.4 MJ of 0.35 μm light to targets for high energy density physics experiments. Such an installation entails specific hazards related to the presence of intense laser beams, and high voltage power laser amplifiers. Furthermore, the thermonuclear fusion reactions induced by the experiment also produce different radiations and neutrons burst, and also activate various materials in the chamber environment. All these hazards could be lethal. The SSP (Personnel Safety System) was designed to prevent accidents and protect personnel working in the LMJ. To satisfy at the lowest cost the requirements of safety regulations and those of the operation management, the choice was made to implement a functional architecture built around two independent technological barriers when required by the risk level. Each technical barrier is composed of two subsets, one dedicated to hazard sources management, and the other one dedicated to worker presence management. The two completely independent barriers, even at the sensor or actuator level, are designed with different technologies adapted to the required Safety Integrity Level. The combination of these 2 barriers is equivalent to a unique barrier with a rate of dangerous failure of about 10 -6 per year

  17. Drug Use and Abuse: Background Information for Security Personnel

    Science.gov (United States)

    1994-05-01

    Neurotoxicity of methamphetamine : Mechanisms of action and issues related to aging. In Miller, M. A., & Kozel, N. J., (Eds.), op. cit. 99. Cox et al...lives. This presents a dilemma for clearance adjudicators. If clearance standards are too lax, security may not be protected . If standards are too...strict, many well-adjusted, adventuresome, and creative employees may be screened out. Drug use may weaken judgment and affect ability to protect

  18. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  19. Health consequences of shift-work: the case of iranian hospital security personnel.

    Science.gov (United States)

    Abedini, Roghayeh; Soltanzadeh, Ahmad; Faghih, Mohammad Amin; Mohammadi, Heidar; Kamalinia, Mojtaba; Mohraz, Majid Habibi; Arassi, Maziyar; Veyseh, Peyman Piran; Aghaei, Hamed; Hosseini, Seyed Younes

    2015-01-01

    Shift-work, which is an ergonomics issue in workplaces, can negatively affect workers. The security personnel of medical centers in Iran have multiple responsibilities and consequently are exposed to such unwanted situations as observing patients, disputing with patient's attendants, unwanted shift schedules, and being away from family for long periods. This study assessed health problems of Iranian hospital security personnel (shift-worker personnel) using the Survey of Shift-workers (SOS) questionnaire (Persian version). This cross-sectional study was conducted in seven medical centers (4 hospitals and 3 clinics). A total of 416 workers were surveyed: shift-workers (exposed group) (n=209) and non-shift-workers (unexposed group) (n=207). The prevalence of adverse health effects was higher in shift-workers than day-workers. The level of education and mean Body Mass Index (BMI) in shift-workers were significantly higher compared with day-workers. The prevalence of gastrointestinal disorders, cardiovascular and psychological problems were also significantly higher in shift-workers compared with day-workers. Overall, the prevalence of health problems among the security personnel of medical centers was high. Hence, it is recommended that personnel be put under periodic monitoring and receive medical counseling and treatment if there is any disorder.

  20. Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach.

    Science.gov (United States)

    Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem

    2013-01-01

    This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff.

  1. Joint force protection advanced security system (JFPASS) "the future of force protection: integrate and automate"

    Science.gov (United States)

    Lama, Carlos E.; Fagan, Joe E.

    2009-09-01

    The United States Department of Defense (DoD) defines 'force protection' as "preventive measures taken to mitigate hostile actions against DoD personnel (to include family members), resources, facilities, and critical information." Advanced technologies enable significant improvements in automating and distributing situation awareness, optimizing operator time, and improving sustainability, which enhance protection and lower costs. The JFPASS Joint Capability Technology Demonstration (JCTD) demonstrates a force protection environment that combines physical security and Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) defense through the application of integrated command and control and data fusion. The JFPASS JCTD provides a layered approach to force protection by integrating traditional sensors used in physical security, such as video cameras, battlefield surveillance radars, unmanned and unattended ground sensors. The optimization of human participation and automation of processes is achieved by employment of unmanned ground vehicles, along with remotely operated lethal and less-than-lethal weapon systems. These capabilities are integrated via a tailorable, user-defined common operational picture display through a data fusion engine operating in the background. The combined systems automate the screening of alarms, manage the information displays, and provide assessment and response measures. The data fusion engine links disparate sensors and systems, and applies tailored logic to focus the assessment of events. It enables timely responses by providing the user with automated and semi-automated decision support tools. The JFPASS JCTD uses standard communication/data exchange protocols, which allow the system to incorporate future sensor technologies or communication networks, while maintaining the ability to communicate with legacy or existing systems.

  2. Results of nuclear security culture survey on personnel at nuclear power plants

    International Nuclear Information System (INIS)

    Yoo, Hosik; Lee, Jeong-Ho

    2015-01-01

    Highlights: • A new surveying questionnaire for evaluating the security awareness of personnel was developed. • The developed surveying tools consist of four categories and 44 questions in total. • The surveying tools developed in this study can be used in other countries. - Abstract: A survey to evaluate awareness of the nuclear security culture of personnel at nuclear facilities was developed. The survey was made up of a series of questionnaires that were divided into four categories, beliefs and attitude, operating systems, leadership behaviors and staff behaviors. Each category contained six to 16 questions. The category on beliefs and attitude was composed of questions that asked plant workers on how much consideration facility personnel give to issues of security when doing his/her work. The section pertaining to operating systems for nuclear security consisted of questions on guidance documents, information security, and education and training. The questions on leadership behaviors were separated into two parts, one for managers and another for staff. These include questions relating to communication between management and staff, surveillance work related to nuclear security and the sharing of information. The last category of questions concerned staff behaviors. It consisted of questions on knowledge, procedures and implementation related to nuclear security. A survey was conducted on 858 people who worked at nuclear power plants using the questionnaire that was developed in this study. The survey was performed between October 7 to 17, 2014. The survey results were collected and analyzed. A numerical value was given to each question, so that the results of the survey were represented as a score. The data revealed that awareness of the nuclear security culture increased with age. This increase stopped when staff members entered their 50s. It is believed that a person in his/her 50s has a greater degree of experience and passion for their work than

  3. 28 CFR 16.132 - Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records...

    Science.gov (United States)

    2010-07-01

    ... System—Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ-006. 16.132...

  4. Families of returned defence force personnel: a changing landscape of challenges.

    Science.gov (United States)

    Berle, David; Steel, Zachary

    2015-08-01

    This paper aims to identify the key challenges experienced by the families of defence force personnel following deployment. We undertook a selective review of four post-deployment challenges to the families of defence force personnel: (1) changes to relationships; (2) changes to family member roles and responsibilities; (3) adjustment of children and parenting challenges; and (4) anger, family conflict and violence. Emerging issues in the area of post-deployment adjustment are also discussed. Empirical studies of post-deployment family adjustment are lacking. Each of the reviewed challenges can contribute to psychological difficulties and precipitate contact with mental health services. The challenges faced by defence force personnel when returning from deployment arise within a family context. Clinicians should thoroughly assess these factors in families following deployment, but also recognise family strengths and resilience to these challenges. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  5. Extending Mobile Security Robots to Force Protection Missions

    National Research Council Canada - National Science Library

    Carroll, Daniel

    2002-01-01

    ...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...

  6. OPTIMIZATION OF FINANCIAL PERSONNEL NUMBER IN ARMED FORCES OF THE REPUBLIC OF BELARUS

    Directory of Open Access Journals (Sweden)

    A. V. Bolshakova

    2014-01-01

    Full Text Available The paper considers a problem pertaining to reduction of the Armed Forces of the Republic of Belarus and necessity to carry out economically reasonable reforms optimizing strength of financial personnel with the purpose to decrease its number but without undermining financial and operational activities of the Armed Forces as a whole. It has been proposed to optimize strength of financial personnel in the Armed Forces while executing organizational staff transformations such as introduction of a centralized accounting system for service personnel by an example of the Ministry of Defense of the Russian Federation.Normative for financial personnel strength of the supposed unified financial centre which is involved in accounting recordings on salary and other payments has been calculated on the basis of inter-branch standards. While taking as an example a conventional organization “B” with staff strength which is equal to the strength of the Armed Forces of the Republic of Belarus the possible efficiency in introduction of the centralized accounting system for service personnel has been determined in the paper. According to represented calculations reduction of financial personnel dealing with accounting recordings on salary and other payments in the whole organization “B” can constitute up to 60 persons with more than 200 branches which are carrying out independent payment accounting for personnel concerned.Dependence of strength normative on number of financial bodies, percentage of personnel receiving payments through a unified financial centre and concentration of financial and economic document circulation has been determined in the paper. It has been pointed out that it is not sufficient to determine quantitative indices in order to ensure an objective reflection of the efficiency of possible introduction of the centralized accounting system for service personnel in the Armed Forces. In order to obtain complete information it is

  7. Closing the Security Gap: Building Irregular Security Forces

    Science.gov (United States)

    2012-06-08

    had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi

  8. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    theory , cases, and policy implications presented. 3 Methods, Assumptions, and Procedures The analytical narrative method was used to test the...underlying theory --developed separately as a principal-agent model with capacity building in the DwP project. These two cases were chosen as part...the following implications for U.S. national security policy: o Use aid to create incentives , especially via conditionality. Avoid apolitical

  9. Pattern of skin diseases among civil population and armed forces personnel at Pune

    Directory of Open Access Journals (Sweden)

    Sayal S

    1997-01-01

    Full Text Available The pattern of skin disorders among 11393 civil and 8123 defence service personnel who attended out-patient department (OPD from January 1989 to December 1994 is presented. Infective dermatoses were more common in civil population (41.2% as compared to defence service personnel (36.3%. Fungal infection was common in both groups (15.1% and 17.2% whereas parasitic infestations and pyoderma were more common in civil population (12.8% and 6.1% as compared to service personnel (7.8% and 3.6%. Among non-infective dermatoses eczemas were more common in civil population (17.3% as compared to Armed Forces personnel (11.7%, whereas papulosquamous disorders, pigmentary disorders, acne and alopecia were more common in Armed Forces personnel (13.5%, 13.4% 8.7% and 6.2% as compared to civil population (10.8%, 10.1%, 6.4% and 4.1%. The incidence of other skin disorders did not differ much between the two groups.

  10. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    2015-09-01

    equipment, and habitat destruction from general construction (DoE, “ Wind Turbine Interactions with Birds , Bats, and Their Habitats,” pgs 2-4). Another...utility-resource-efficiency>, accessed 16 December 2014. Department of Energy, Wind Turbine Interactions with Birds , Bats, and Their Habitats... Wind power is a mature technology, with wind turbines first being used for electricity in the late 19th century. The Air Force operates two wind

  11. Weapons of Mass Destruction and Domestic Force Protection: Basic Response Capability for Military, Police & Security Forces

    National Research Council Canada - National Science Library

    Manto, Samuel

    1999-01-01

    ... actions to improve preparedness. This paper examines what a minimum basic response capability for all military, police and security forces should be to ensure at least some chance for their own survival and possible early warning...

  12. Operational Stress and Correlates of Mental Health Among Joint Task Force Guantanamo Bay Military Personnel.

    Science.gov (United States)

    Webb-Murphy, Jennifer A; De La Rosa, Gabriel M; Schmitz, Kimberly J; Vishnyak, Elizabeth J; Raducha, Stephanie C; Roesch, Scott C; Johnston, Scott L

    2015-12-01

    Military personnel deployed to Joint Task Force Guantanamo Bay (JTF-GTMO) faced numerous occupational stressors. As part of a program evaluation, personnel working at JTF-GTMO completed several validated self-report measures. Personnel were at the beginning, middle, or end of their deployment phase. This study presents data regarding symptoms of posttraumatic stress disorder, alcohol abuse, depression, and resilience among 498 U.S. military personnel deployed to JTF-GTMO in 2009. We also investigated individual and organizational correlates of mental health among these personnel. Findings indicated that tenure at JTF-GTMO was positively related to adverse mental health outcomes. Regression models including these variables had R2 values ranging from .02 to .11. Occupation at JTF-GTMO also related to mental health such that guards reported poorer mental health than medical staff. Reluctance to seek out mental health care was also related to mental health outcomes. Those who reported being most reluctant to seek out care tended to report poorer mental health than those who were more willing to seek out care. Results suggested that the JTF-GTMO deployment was associated with significant psychological stress, and that both job-related and attitude-related variables were important to understanding mental health symptoms in this sample. Copyright © 2015 International Society for Traumatic Stress Studies.

  13. Machine vision applications for physical security, quality assurance and personnel dosimetry

    International Nuclear Information System (INIS)

    Kar, S.; Shrikhande, S.V.; Suresh Babu, R.M.

    2016-01-01

    Machine vision is the technology used to provide imaging-based solutions to variety of applications, relevant to nuclear facilities and other industries. It uses computerized image analysis for automatic inspection, process control, object sorting, parts assembly, human identity authentication, and so on. In this article we discuss the in-house developed machine vision systems at EISD, BARC for three specific areas: Biometric recognition for physical security, visual inspection for QA of fuel pellets, and fast neutron personnel dosimetry. The advantages in using these systems include objective decision making, reduced man-rem, operational consistency, and capability of statistical quantitative analysis. (author)

  14. Codetermination of the works council in matterss of a security screening of personnel

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If the licensing authority issues a licence to the operator of a nuclear installation subject to the obligation to have personnel to be employed or to be kept on screened for security purposes by the licensing authority, the works council of the nuclear installation is not in the position to demand refrainment from screening activities unless the works council has given consent. (BAGE 58, 297 = NZA 1988, 811 = AP Paragraph 87 BetrVG 1972 - Ordnung des Betriebes - Nr. 14). Decision of the Federal Labour Court of July 9, 1991 - 1 ABR 57/90 (lower instance: LAG Koeln, decision dated June 12, 1990 - 4 TaBV 2/90). (orig.) [de

  15. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  16. Employment of personnel of a security service company does not require the consent of the works council

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. Federal Labour Court, decision dated May 5, 1992 - 1 ABR 78/91. (orig./HP) [de

  17. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  18. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  19. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  20. Air Force Personnel Can Improve Compliance With the Berry Amendment and Buy American Act

    Science.gov (United States)

    2016-02-24

    leather, furs,6 apparel , and shoes • FSG 84 – clothing , individual equipment and insignia • FSG 89 – subsistence (food) If these items are purchased...during the audit by completing Buy American Act training and amending standard operating procedures and internal processes to improve compliance with the...Force Personnel Can Improve Compliance With the Berry Amendment and the Buy American Act F E B R U A R Y 2 4 , 2 0 1 6 Report No. DODIG-2016-051

  1. Women in combat: The status and roles assigned female personnel in the permanent defence forces.

    OpenAIRE

    Clonan, Thomas Martin

    2000-01-01

    The aim of the PhD study is to examine critically the integration of female personnel within the Permanent Defence Forces (PDF). Their integration is examined in light of the deployment of women in the international military, and in light of a liberal-feminist examination of the workplace in terms of its equality of opportunity agenda. It is argued that the sex-role stereotyping used to recruit young men in to the military in the past along with socio-biological theories of women’s and me...

  2. Utilization of psychiatric services by female military personnel changes since admission of women to all German Armed Forces military careers.

    Science.gov (United States)

    Zimmermann, Peter; Ströhle, Andreas; Langner, Franziska; Lanczik, Mario

    2010-07-01

    In 2001, women were admitted to all military careers in the German Armed Forces. This study examines whether the utilization of psychiatric services of female military personnel has changed since then. The central medical database of German military personnel for the years 2000 and 2006 was analyzed. Between 2000 and 2006, the percentage (based on the average totals of male and female military personnel) of consultations of primary care unit surgeons for psychiatric problems increased significantly for both male and female military personnel, this increase being more apparent for women than for men. Stress-related disorders showed the greatest rise. In 2006, as opposed to 2000, the total proportion of both outpatient and inpatient mental health treatment provided to female military personnel was significantly higher than for males, particularly regarding stress-related, affective and personality disorders. Gender-specific aspects should be considered more intensely in preventive and therapeutic psychiatric supply in the German Armed Forces.

  3. The health and cost implications of high body mass index in Australian defence force personnel

    Directory of Open Access Journals (Sweden)

    Peake Jonathan

    2012-06-01

    Full Text Available Abstract Background Frequent illness and injury among workers with high body mass index (BMI can raise the costs of employee healthcare and reduce workforce maintenance and productivity. These issues are particularly important in vocational settings such as the military, which require good physical health, regular attendance and teamwork to operate efficiently. The purpose of this study was to compare the incidence of injury and illness, absenteeism, productivity, healthcare usage and administrative outcomes among Australian Defence Force personnel with varying BMI. Methods Personnel were grouped into cohorts according to the following ranges for (BMI: normal (18.5 − 24.9 kg/m2; n = 197, overweight (25–29.9 kg/m2; n = 154 and obese (≥30 kg/m2 with restricted body fat (≤28% for females, ≤24% for males (n = 148 and with no restriction on body fat (n = 180. Medical records for each individual were audited retrospectively to record the incidence of injury and illness, absenteeism, productivity, healthcare usage (i.e., consultation with medical specialists, hospital stays, medical investigations, prescriptions and administrative outcomes (e.g., discharge from service over one year. These data were then grouped and compared between the cohorts. Results The prevalence of injury and illness, cost of medical specialist consultations and cost of medical scans were all higher (p  Conclusions High BMI in the military increases healthcare usage, but does not disrupt workforce maintenance. The greater prevalence of injury and illness, greater healthcare usage and lower productivity in obese Australian Defence Force personnel is not related to higher levels of body fat.

  4. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    Science.gov (United States)

    2015-12-01

    culture, morale, and job satisfaction levels of employees .28 Gerstein argues the development of a Homeland Security personnel system and career maps...and culture, low morale, and job satisfaction levels of employees . DHS has been following a similar approach to the DOD in terms of professional...Homeland Security in its ability to accomplish its mission. Leadership weaknesses, insufficient education and training for employees , and retention

  5. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  6. Task Force Report, Safety of Personnel in LHC underground areas following the accident of 19th September 2008

    CERN Document Server

    Delille, B; Inigo-Golfin, J; Lindell, G; Roy, G; Tavian, L; Thomas, E; Trant, R; Völlinger, C

    2009-01-01

    In January 2009, the Task Force on Safety of Personnel in the LHC underground areas following the accident in sector 3-4 of 19th September 2008 (Safety Task Force) received from the CERN Director General the mandate to investigate the impact of the accident of 19th September 2008 on the safety of personnel working in the LHC underground areas. This mandate includes the elaboration of preventive and/or corrective measures, if deemed necessary. This report gives the conclusions and recommendations of the Safety Task Force which have been reviewed by an external advisory committee of safety experts.

  7. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  8. Urinary biomarkers of occupational jet fuel exposure among Air Force personnel.

    Science.gov (United States)

    Smith, Kristen W; Proctor, Susan P; Ozonoff, A L; McClean, Michael D

    2012-01-01

    There is a potential for widespread occupational exposure to jet fuel among military and civilian personnel. Urinary metabolites of naphthalene have been suggested for use as short-term biomarkers of exposure to jet fuel (jet propulsion fuel 8 (JP8)). In this study, urinary biomarkers of JP8 were evaluated among US Air Force personnel. Personnel (n=24) were divided a priori into high, moderate, and low exposure groups. Pre- and post-shift urine samples were collected from each worker over three workdays and analyzed for metabolites of naphthalene (1- and 2-naphthol). Questionnaires and breathing-zone naphthalene samples were collected from each worker during the same workdays. Linear mixed-effects models were used to evaluate the exposure data. Post-shift levels of 1- and 2-naphthol varied significantly by a priori exposure group (levels in high group>moderate group>low group), and breathing-zone naphthalene was a significant predictor of post-shift levels of 1- and 2-naphthol, indicating that for every unit increase in breathing-zone naphthalene, there was an increase in naphthol levels. These results indicate that post-shift levels of urinary 1- and 2-naphthol reflect JP8 exposure during the work-shift and may be useful surrogates of JP8 exposure. Among the high exposed workers, significant job-related predictors of post-shift levels of 1- and 2-naphthol included entering the fuel tank, repairing leaks, direct skin contact with JP8, and not wearing gloves during the work-shift. The job-related predictors of 1- and 2-naphthol emphasize the importance of reducing inhalation and dermal exposure through the use of personal protective equipment while working in an environment with JP8.

  9. The mental health and substance misuse needs of male ex-armed forces personnel in prison.

    Science.gov (United States)

    Wainwright, Verity; Lennox, Charlotte; McDonnell, Sharon; Shaw, Jenny; Senior, Jane

    2018-01-01

    Ex-armed forces personnel constitute the largest known occupational group in prison but there is little evidence regarding their mental health, or substance misuse, needs. A total of 105 participants were interviewed and measures assessing symptoms of common mental health (CMH) problems and substance misuse were completed along with a review of their health care records. Forty (38%) participants screened for current CMH problems (CCMH) and high levels of dual symptomology and alcohol misuse were assessed. Thirty-nine (37%) had a mental health diagnosis recorded, most commonly for post-traumatic stress disorder (PTSD), depression and personality disorder. Those who screened for a CCMH problem were more likely to have pre-service vulnerability to negative health outcomes and those with dual symptomology were more likely to have experienced deployment during their service. Findings suggest the mental health needs of this group are similar to the general prison population. Potentially higher prevalences of PTSD and alcohol misuse may direct service provision.

  10. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  11. KOSOVO FORCE (KFOR ORGANIZATION IMAGE: EMPIRICAL RESEARCH ON KOSOVO SECURITY FORCES (KSF

    Directory of Open Access Journals (Sweden)

    Korhan ARUN

    2014-10-01

    Full Text Available ABSTRACT: Comprehensive efforts to rebuild a society’s security and peace-enforcing have become an increasingly frequent activity of the NATO as KFOR (Kosovo Force, which is formed of many countries that its image results from these countries collateral relations. KFOR’s image has come to the fore because it affects the mission success and decisions about its existence in Kosovo. The image has two components, functional and emotional: Military symbols and uniforms of NATO (KFOR are functional and emotional relations of countries with Kosovo Security Forces (KSF members are emotional part. In this research; the main objective is finding out the effects that shape KFOR image. Sublevel objectives are the effects of Kosovo’s “connections”, KSF “personal links” and “perceived mission success” with KFOR member states in KFOR image. To study these effect 3 hypothesis are formed and empirical research is done with KSF members to get a foundation of emotional relationship which affects country image. Evaluating of questionnaires with linear regression, correlation and factor analysis, besides the important effects of ethnocentrism and patriotism, military personnel relations formed by countries military involvement and activities found as predictor factors in KFOR image. As a matter of course these base components of emotions about the image will enlighten future literature about building an organizational image. Keywords: Organizational Image, Country Image, Image, KFOR (Kosovo Force. ÖZ: Birçok ülkenin katkılarıyla oluşan ve imajı da bu ülkelerin tamamlayıcı ilişkileri sonucu ortaya çıkan NATO’nun uluslararası topluma yansıyan yüzü olarak Kosova Gücü (KFOR için toplumun güvenliğini yeniden tesis etmek ve barışı zorlama faaliyetleri gittikçe daha geniş kapsamlı bir çaba haline gelmektedir. KFOR’un imajının öne çıkmasının nedeni görevin başarılmasında ve Kosova’daki varlığıyla ilgili

  12. Evaluation of scattered radiation emitted from X-ray security scanners on occupational dose to airport personnel

    International Nuclear Information System (INIS)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-01-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits. - Highlights: • Backscattered radiation emitted from the airport security scanners is estimated. • Inverse relation observed between backscattered radiation and scanners distance. • Occupational dose for personnel inspecting the scanners were up to 2.04 mSv/y. • The projected dose of security and engineering staff are well within dose limits.

  13. FAA computer security : concerns remain due to personnel and other continuing weaknesses

    Science.gov (United States)

    2000-08-01

    FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...

  14. A Multi-Objective Decision Support Model for the Turkish Armed Forces Personnel Assignment System

    National Research Council Canada - National Science Library

    Cimen, Zubeyir

    2001-01-01

    .... TAF wants to obtain maximum utilization of its personnel by assigning the right person to the right job at the right time, To accomplish this task, decision-makers and personnel assignment staff...

  15. Reasons for medical evacuations of soldiers serving in International Security Assistance Force (ISAF) operation in Afghanistan.

    Science.gov (United States)

    Korzeniewski, Krzysztof; Gregulski, Robert

    2014-01-01

    The article presents the results of a research study into the reasons for medical evacuations of Polish military personnel taking part in the International Security Assistance Force (ISAF) operation in Afghanistan from 2007 to 2013. The authors have analysed medical records of 485 soldiers who were medically evacuated out of a combat zone in Afghanistan for battle injuries, non-battle injuries and diseases. Each medically evacuated Polish soldier was subjected to statistical analysis. The study population comprised 25,974 soldiers assigned to the Polish Military Contingent Afghanistan in the given period. From 2007 to 2013, 1.9% of the Polish military personnel (n = 485) participating in the ISAF operation in Afghanistan were evacuated for medical reasons before the scheduled termination of their contract. 40.6% of all medical evacuations were due to battle injuries, 32.4% due to non-battle injuries, and 27.0% due to diseases. ISAF is an example of a combat operation, in which battle injuries remain the leading health problem in mission participants. 3 of 4 Polish soldiers who were medically evacuated from Afghanistan were no longer fit for military service in the area of operations due to the traumas they had suffered.

  16. Epidemiology of HIV among US Air Force Military Personnel, 1996-2011.

    Directory of Open Access Journals (Sweden)

    Shilpa Hakre

    Full Text Available The objectives of this study were to describe the epidemiology of HIV in the United States Air Force (USAF from 1996 through 2011 and to assess whether socio-demographic characteristics and service-related mobility, including military deployments, were associated with HIV infection.We conducted a retrospective cohort analysis of USAF personnel who were HIV-infected during the study period January 1, 1996 through December 31, 2011 and a matched case-control study. Cases were USAF personnel newly-diagnosed with HIV during the study period. Five randomly-selected HIV-uninfected controls were matched to each case by age, length of service, sex, race, service, component, and HIV test collection date. Socio-demographic and service-related mobility factors and HIV diagnosis were assessed using conditional logistic regression.During the study period, the USAF had 541 newly diagnosed HIV-infected cases. HIV incidence rate (per 100,000 person-years among 473 active duty members was highest in 2007 (16.78, among black/ African-American USAF members (26.60 and those aged 25 to 29 years (10.84. In unadjusted analysis restricted to personnel on active duty, 10 characteristics were identified and considered for final multivariate analysis. Of these single (adjusted odds ratio [aOR], 8.15, 95% confidence interval [CI] 5.71-11.6 or other marital status (aOR 4.60, 95% CI 2.72-7.75, communications/ intelligence (aOR 2.57, 95% CI 1.84-3.60 or healthcare (aOR 2.07, 95% CI 1.28-3.35 occupations, and having no deployment in the past 2 years before diagnosis (aOR 2.02, 95% CI 1.47-2.78 conferred higher odds of HIV infection in adjusted analysis.The highest risk of HIV infection in the USAF was among young unmarried deployment-naïve males, especially those in higher risk occupation groups. In an era when worldwide military operations have increased, these analyses identified potential areas where targeted HIV prevention efforts may be beneficial in reducing HIV

  17. The influence of sexual harassment on mental health among female military personnel of the Republic of Korea Armed Forces

    OpenAIRE

    Kim, Tae Kyung; Lee, H-C; Lee, S G; Han, K-T; Park, E-C

    2016-01-01

    Introduction Reports of sexual harassment are becoming more frequent in Republic of Korea (ROK) Armed Forces. This study aimed to analyse the impact of sexual harassment on mental health among female military personnel of the ROK Armed Forces. Methods Data from the 2014 Military Health Survey were used. Instances of sexual harassment were recorded as ?yes? or ?no?. Analysis of variance (ANOVA) was carried out to compare Kessler Psychological Distress Scale 10 (K-10) scores. Multiple logistic ...

  18. Characterization of inhalation exposure to jet fuel among U.S. Air Force personnel.

    Science.gov (United States)

    Merchant-Borna, Kian; Rodrigues, Ema G; Smith, Kristen W; Proctor, Susan P; McClean, Michael D

    2012-07-01

    Jet propulsion fuel-8 (JP-8) is the primary jet fuel used by the US military, collectively consuming ~2.5 billion gallons annually. Previous reports suggest that JP-8 is potentially toxic to the immune, respiratory, and nervous systems. The objectives of this study were to evaluate inhalation exposure to JP-8 constituents among active duty United States Air Force (USAF) personnel while performing job-related tasks, identify significant predictors of inhalation exposure to JP-8, and evaluate the extent to which surrogate exposure classifications were predictive of measured JP-8 exposures. Seventy-three full-time USAF personnel from three different air force bases were monitored during four consecutive workdays where personal air samples were collected and analyzed for benzene, ethylbenzene, toluene, xylenes, total hydrocarbons (THC), and naphthalene. The participants were categorized a priori into high- and low-exposure groups, based on their exposure to JP-8 during their typical workday. Additional JP-8 exposure categories included job title groups and self-reported exposure to JP-8. Linear mixed-effects models were used to evaluate predictors of personal air concentrations. The concentrations of THC in air were significantly different between a priori exposure groups (2.6 mg m(-3) in high group versus 0.5 mg m(-3) in low, P fuel distribution/maintenance, though self-reported exposure to JP-8 was an even stronger predictor of measured exposure in models that explained 72% (THC) and 67% (naphthalene) of between-worker variability. In fact, both self-report JP-8 exposure and a priori exposure groups explained more between-worker variability than job categories. Personal exposure to JP-8 varied by job and was positively associated with the relative humidity. However, self-reported exposure to JP-8 was an even stronger predictor of measured exposure than job title categories, suggesting that self-reported JP-8 exposure is a valid surrogate metric of exposure when

  19. Response to nuclear and radiological terrorism - the viewpoint from the security forces

    International Nuclear Information System (INIS)

    Baciu, A.

    2005-01-01

    Full text: A threat of a malevolent act may be deemed to exist when information has been received that terrorists, criminals or other persons intend to: manufacture, use, transport, dispose radioactive materials in order to hide the nature of material; perpetrate a deliberate act to irradiate a person or persons; perpetrate a deliberate act to contaminate food or water supplies with radioactive materials; create and deploy a radiation dispersal device; perpetrate a deliberate act to contaminate a site or the environment with radioactive materials; or mount a sabotage attack upon a nuclear facility aimed at causing an uncontrolled release of radioactive materials. Security forces will be involved in all aspects of the response: at the scene, to lead, to control the crime scene and preserve evidence; at the hospitals, to identify and manage witnesses who may assist in the ensuing investigation, and to protect emergency medical personnel if perpetrators are part of the casualties; and at the regional and national coordination level, to manage the overall criminal investigation; to take under physical protection the seized materials. Law enforcement response: key considerations to all police (security and investigating) personnel at the scene of a terrorist act will include the following: do not approach the scene without proper radiological support; be aware of the possible presence of other radiological hazards; the radiological team will seek the removal of safety hazards. Work with that team to minimize hazards while not compromising the investigation. Minimize traffic through the scene: this will help reduce the spread of radioactive contamination, if present; people present at the scene need to be held for questioning. However, they will also have fears due to the presence of radiation. Work with the radiological team to minimize radiological hazards and fears while not compromising the investigation procedure. (author)

  20. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  1. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  2. Inhalation exposure to jet fuel (JP8) among U.S. Air Force personnel.

    Science.gov (United States)

    Smith, Kristen W; Proctor, Susan P; Ozonoff, Al; McClean, Michael D

    2010-10-01

    As jet fuel is a common occupational exposure among military and civilian populations, this study was conducted to characterize jet fuel (JP8) exposure among active duty U.S. Air Force personnel. Personnel (n = 24) were divided a priori into high, moderate, and low exposure groups. Questionnaires and personal air samples (breathing zone) were collected from each worker over 3 consecutive days (72 worker-days) and analyzed for total hydrocarbons (THC), benzene, toluene, ethylbenzene, xylenes, and naphthalene. Air samples were collected from inside the fuel tank and analyzed for the same analytes. Linear mixed-effects models were used to evaluate the exposure data. Our results show that the correlation of THC (a measure of overall JP8 inhalation exposure) with all other analytes was moderate to strong in the a priori high and moderate exposure groups combined. Inhalation exposure to all analytes varied significantly by self-reported JP8 exposure (THC levels higher among workers reporting JP8 exposure), a priori exposure group (THC levels in high group > moderate group > low group), and more specific job task groupings (THC levels among workers in fuel systems hangar group > refueling maintenance group > fuel systems office group > fuel handling group > clinic group), with task groupings explaining the most between-worker variability. Among highly exposed workers, statistically significant job task-related predictors of inhalation exposure to THC indicated that increased time in the hangar, working close to the fuel tank (inside > less than 25 ft > greater than 25 ft), primary job (entrant > attendant/runner/fireguard > outside hangar), and performing various tasks near the fuel tank, such as searching for a leak, resulted in higher JP8 exposure. This study shows that while a priori exposure groups were useful in distinguishing JP8 exposure levels, job task-based categories should be considered in epidemiologic study designs to improve exposure classification. Finally

  3. [Occupational risks among public safety and security forces].

    Science.gov (United States)

    Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V

    2006-01-01

    The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational

  4. Report: EPA’s Information Systems and Data Are at Risk Due to Insufficient Training of Personnel With Significant Information Security Responsibilities

    Science.gov (United States)

    Report #14-P-0142, March 21, 2014. The EPA places its information systems and data at risk due to an organizational structure that has not specified required duties and responsibilities to ensure personnel are trained on key information security roles.

  5. DOD PERSONNEL CLEARANCES: Additional OMB Actions Are Needed to Improve the Security Clearance Process

    National Research Council Canada - National Science Library

    2006-01-01

    Our independent analysis of timeliness data showed that industry personnel contracted to work for the federal government waited more than one year on average to receive top secret clearances, longer...

  6. 32 CFR 632.4 - Deadly force.

    Science.gov (United States)

    2010-07-01

    ..., is substantially important to national security. (See paragraph (b) of this section.) (iii) Escape of... security or an essential national defense mission. (2) Substantially important to national security based... INVESTIGATIONS USE OF FORCE BY PERSONNEL ENGAGED IN LAW ENFORCEMENT AND SECURITY DUTIES § 632.4 Deadly force. (a...

  7. 14 CFR 1203b.106 - Use of deadly force.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Use of deadly force. 1203b.106 Section... AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.106 Use of deadly force. Deadly force shall be used only in those circumstances where the security force officer reasonably believes that...

  8. PLC-based search and secure interlock system for the personnel safety in folded tandem ion accelerator

    International Nuclear Information System (INIS)

    Padmakumar, Sapna; Subramanyum, N.B.V.; Bhatt, Jignesh P.; Ware, Shailaja V.; Kansara, M.J.; Gupta, S.K.; Singh, P.

    2006-01-01

    Safety of the personnel is one of the key issues addressed in any accelerator project. The FOTIA facility at BARC is capable of operating under standard operation conditions without any radiation hazard. Even then for a safe and reliable operation of FOTIA a PLC (Programmable logic controller) based interlock system has been implemented. This interlocking system is compact, modular, flexible, robust and easy for troubleshooting. These advantages led to the popularity of PLC rather than using a relay-based system. This paper highlights the salient features of the search and secure interlock for the personal safety of FOTIA. (author)

  9. 10 CFR Appendix B to Part 73 - General Criteria for Security Personnel

    Science.gov (United States)

    2010-01-01

    .... Fixed site. B. Transportation. VI. Nuclear Power Reactor Training and Qualification Plan for Personnel.... Definitions Introduction Applicants and power reactor licensees subject to the requirements of § 73.55 shall... licensee to investigate into or judge the reading habits, political or religious beliefs, or attitudes on...

  10. 32 CFR Appendix E to Part 154 - Personnel Security Determination Authorities

    Science.gov (United States)

    2010-07-01

    ... designee 5. Chairman, Joint Chiefs of Staff and/or designee 6. Directors of the Defense Agencies and/or... personnel for assignment to Presidential Support activities: The Executive Secretary to the Secretary and... of Strategic Target Planning 2. Director, Joint Staff, OJCS 3. Chief of Staff, U.S. Army 4. Chief of...

  11. Muddling Through: An Analysis of Security Force Assistance in Iraq

    Science.gov (United States)

    2017-05-25

    OSC-I mostly fell back into their comfort zone of managing 60 foreign military sales programs as the nominal advisement programs quickly fell apart...implications of these observations are critical to future SFA efforts, as the US government seeks to continue a long-term strategy of advising and...Iraqi Army, Mosul, ISIS, Advise and Assist, Security Assistance, Security Cooperation, MNSTC-I, OIF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  12. Reprint of 'Evaluation of Scattered Radiation Emitted From X-ray Security Scanners on Occupational Dose to Airport Personnel'

    Science.gov (United States)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-11-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits.

  13. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge...) Methods of physical screening of persons, personal effects, baggage, cargo, and vessel stores; and (m) The...

  14. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as... security equipment and systems; (i) Inspection, control, and monitoring techniques; (j) Methods of physical...

  15. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  16. Guidelines for the training, credentialing, use, and supervision of speech-language pathology assistants. Task Force on Support Personnel.

    Science.gov (United States)

    1996-01-01

    These guidelines are an official statement of the American Speech-Language-Hearing Association. They provide guidance on the training, credentialing, use, and supervision of one category of support personnel in speech-language pathology: speech-language pathology assistants. Guidelines are not official standards of the Association. They were developed by the Task Force on Support Personnel: Dennis J. Arnst, Kenneth D. Barker, Ann Olsen Bird, Sheila Bridges, Linda S. DeYoung, Katherine Formichella, Nena M. Germany, Gilbert C. Hanke, Ann M. Horton, DeAnne M. Owre, Sidney L. Ramsey, Cathy A. Runnels, Brenda Terrell, Gerry W. Werven, Denise West, Patricia A. Mercaitis (consultant), Lisa C. O'Connor (consultant), Frederick T. Spahr (coordinator), Diane Paul-Brown (associate coordinator), Ann L. Carey (Executive Board liaison). The 1994 guidelines supersede the 1981 guidelines entitled, "Guidelines for the Employment and Utilization of Supportive Personnel" (Asha, March 1981, 165-169). Refer to the 1995 position statement on the "Training, Credentialing, Use, and Supervision of Support Personnel in Speech-Language Pathology" (Asha, 37 [Suppl. 14], 21).

  17. Report on Progress Toward Security and Stability in Afghanistan and United States Plan for Sustaining the Afghanistan National Security Forces

    Science.gov (United States)

    2011-04-01

    105  8.2: INDIA ...2B Afghan Air Force 0 AMoD Education 3 ASOC 0 Gender Integration 0 Personnel Management 2B National Logistics 2B GS G1 2B AMoD AT&L 2B...award nomination package cites her determination to overcome Afghanistan’s cultural stereotypes and to serve in the military “as long as my country

  18. Securing Document Warehouses against Brute Force Query Attacks

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2017-04-01

    Full Text Available The paper presents the scheme of data management and protocols for securing document collection against adversary users who try to abuse their access rights to find out the full content of confidential documents. The configuration of secure document retrieval system is described and a suite of protocols among the clients, warehouse server, audit server and database management server is specified. The scheme makes it infeasible for clients to establish correspondence between the documents relevant to different search queries until a moderator won’t give access to these documents. The proposed solution allows ensuring higher security level for document warehouses.

  19. 77 FR 13206 - Protective Force Personnel Medical, Physical Readiness, Training, and Access Authorization Standards

    Science.gov (United States)

    2012-03-06

    ... reduction in exposure to potential injuries associated with physical readiness qualification running tests... personnel to perform the running tasks required in the current regulation. Furthermore, this shift in... reduce the exposure of the PF population to injuries related to physical readiness testing. They would...

  20. Comparison of the Force Required for Dislodgement Between Secured and Unsecured Airways.

    Science.gov (United States)

    Davenport, Curtis; Martin-Gill, Christian; Wang, Henry E; Mayrose, James; Carlson, Jestin N

    2018-05-01

    Airway device placement and maintenance are of utmost importance when managing critically ill patients. The best method to secure airway devices is currently unknown. We sought to determine the force required to dislodge 4 types of airways with and without airway securing devices. We performed a prospective study using 4 commonly used airway devices (endotracheal tube [ETT], laryngeal mask airway [LMA], King laryngeal tube [King], and iGel) performed on 5 different mannequin models. All devices were removed twice per mannequin in random order, once unsecured and once secured as per manufacturers' recommendations; Thomas Tube Holder (Laerdal, Stavanger, Norway) for ETT, LMA, and King; custom tube holder for iGel. A digital force measuring device was attached to the exposed end of the airway device and gradually pulled vertically and perpendicular to the mannequin until the tube had been dislodged, defined as at least 4 cm of movement. Dislodgement force was reported as the maximum force recorded during dislodgement. We compared the relative difference in the secured and unsecured force for each device and between devices using a random-effects regression model accounting for variability in the manikins. The median dislodgment forces (interquartile range [IQR]) in pounds for each secured device were: ETT 13.3 (11.6, 14.1), LMA 16.6 (13.9, 18.3), King 21.7 (16.9, 25.1), and iGel 8 (6.8, 8.3). The median dislodgement forces for each unsecured device were: ETT 4.5 (4.3, 5), LMA 8.4 (6.8, 10.7), King 10.6 (8.2, 11.5), and iGel 3.9 (3.2, 4.2). The relative difference in dislodgement forces (95% confidence intervals) were higher for each device when secured: ETT 8.6 (6.2 to 11), LMA 8.8 (4.6 to 13), King 12.1 (7.2 to 16.6), iGel 4 (1.1 to 6.9). When compared to secured ETT, the King required greater dislodgement force (relative difference 8.6 [4.5-12.7]). The secured iGel required less force than the secured ETT (relative difference -4.8 [-8.9 to -0.8]). Compared with a

  1. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  2. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  3. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    National Research Council Canada - National Science Library

    Atha, Roberto J

    2008-01-01

    .... It reveals how the influence of the military affected the implementation of internal security reforms, influencing the professionalism and effectiveness of police forces in the fight against violence and gangs today...

  4. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    Science.gov (United States)

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  5. 32 CFR 154.8 - Types and scope of personnel security investigations.

    Science.gov (United States)

    2010-07-01

    ..., benefits, and privileges under Federal programs. Accordingly, personal interviews are an integral part of... forth in the following paragraphs of this section. (1) BI/PR. A personal interview shall be conducted by... security clearability, or be otherwise stigmatizing. (3) Hostage situation. A personal interview shall be...

  6. Rescuing Joint Personnel Recovery: Using Air Force Capability to Address Joint Shortfalls

    Science.gov (United States)

    2011-06-01

    of an IP, the IP is not successfully reintegrated or the lessons learned are not incorporated into other operations. Adversaries will benefit from...Washington, D.C.: Office of Air Force History , United States Air Force, 1980, 117. 47 Durant , Michael J. In the Company of Heroes, Penguin Group... Lessons Learned, 22 September 2005, 3. 2 US Joint Task Force Katrina. The Federal Response to Hurricane Katrina Lessons Learned, February 2006, 54

  7. Assessing Psycho-Social Resilience in Diplomatic, Civilian & Military Personnel Serving in a High-Threat Security Environment during Counter-Insurgency and Counter-Terrorism Operations in Iraq

    Directory of Open Access Journals (Sweden)

    Anne Speckhard

    2012-08-01

    Full Text Available Currently thousands of military, diplomatic and civilian personnel are deployed under NATO, UN, and other multi-national, as well as national auspices in high-threat security environments, including active conflict zones such as Iraq and Afghanistan.  Soldiers are generally well trained and prepared psychologically to face armed conflict. Civilian contractors and diplomats, on the other hand, often are not.  Moreover in today’s high-threat security environments terrorists, insurgents and even child soldiers may be the opposing force, creating a more uncertain and anxiety provoking environment and more difficult to identify security threat. These facts have serious implications for the psycho-social resilience of diplomatic, civilian and military personnel deployed in such environments.  This article investigates psycho-social resilience in a small exploratory sample of US embassy staff, contractors and US forces serving in Iraq during 2007, a time when Improvised Explosive Devices (IEDs, roadside bombings, mortar attacks, kidnappings, murders and sniper fire were an everyday occurrence in Iraq.

  8. The Role Of Food Proximity in Eating Behavior and Body Mass Index Among Air Force Personnel

    Science.gov (United States)

    2009-02-23

    the more current 2003 report indicated a 15.3% prevalence of obesity among active duty Army personnel (National Quality Management Program, 2003...active duty military members have a BMI of 30 kg/m2 or greater; National Quality Management Program, 2003). Collectively, these findings are...carry-out eating places without waiter service” (French, et al., 2001). It is important to note, however, that the definition of fast food tends to

  9. Method to control the persons permitted to enter plants with increased security requirements and personnel lock for such plants

    International Nuclear Information System (INIS)

    Blaser, E.; Eickhoff, H.; Tretschoks, W.

    1978-01-01

    The personnel lock for a plant with increased security requirements, e.g. a nuclear power plant, has got two lock gates. Only persons whose right to enter has been established by the control equipment will be admitted to the lock chamber. For this purpose an identification recess is built in front of the first access to the lock chamber, where size, weight and the contours of the persons wanting to enter are roughly measured and compared with a code card carried along. The weight is established by a balance forming part of the base of the recess. By means of contact surfaces in the region of knees, upper thigh, chest and shoulder an upright position of the person is guaranteed. Scanning of the physical dimensions is performed with laser, infrared and light barriers. (DG) [de

  10. Air Force Military Personnel Entitlement Pay in Support of Contingency Operations

    Science.gov (United States)

    2010-08-23

    Report No. A-2006-0067- FFM , “Military Pay for Operation Enduring Freedom/Operation Iraqi Freedom Active Components,” April 5, 2006 U.S. Army Audit...Agency Report No. A-2006-0079- FFM , “Material Weakness Closeout on Line of Duty and Incapacitation Pay,” March 8, 2006 22B22BAir Force Air Force

  11. Taming the wounded lion: Transforming security forces in West Africa

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-01

    Feb 1, 2011 ... Solidarity networks of language and culture link ethnic groups ... policymaking process, financial management issues, defence forces, ... Related articles ... of the developing world's brightest scientists find new ways to improve ...

  12. The Australian Defence Force: Broadened Concepts of Security Operations

    National Research Council Canada - National Science Library

    Wing, Ian

    1998-01-01

    ...-fighting role and could result in fundamental force structure and resource changes. More Australian Government policy changes are possible, and increased participation in counter-drug operations has been foreshadowed...

  13. The influence of sexual harassment on mental health among female military personnel of the Republic of Korea Armed Forces.

    Science.gov (United States)

    Kim, Tae Kyung; Lee, H-C; Lee, S G; Han, K-T; Park, E-C

    2017-04-01

    Reports of sexual harassment are becoming more frequent in Republic of Korea (ROK) Armed Forces. This study aimed to analyse the impact of sexual harassment on mental health among female military personnel of the ROK Armed Forces. Data from the 2014 Military Health Survey were used. Instances of sexual harassment were recorded as 'yes' or 'no'. Analysis of variance (ANOVA) was carried out to compare Kessler Psychological Distress Scale 10 (K-10) scores. Multiple logistic regression analysis was performed to identify associations between sexual harassment and K-10 scores. Among 228 female military personnel, 13 (5.7%) individuals experienced sexual harassment. Multiple logistic regression analysis revealed that sexual harassment had a significantly negative impact on K-10 scores (3.486, psexual harassment were identified in the unmarried (including never-married) group (6.761, pSexual harassment has a negative impact on mental health. Factors associated with worse mental health scores included service classification and length of service. The results provide helpful information with which to develop measures for minimising the negative psychological effects from sexual harassment and promoting sexual harassment prevention policy. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  14. Impact of a 7-Day Field Training on Oral Health Condition in Japan Ground Self-Defense Force Personnel.

    Science.gov (United States)

    Yamashita, Koji; Nishiyama, Takeshi; Nagata, Emi; Ramadhani, Atik; Kawada-Matsuo, Miki; Komatsuzawa, Hitoshi; Oho, Takahiko

    2017-07-01

    In the Japan Ground Self-Defense Force (JGSDF), personnel periodically perform intensive training that mimics the conditions seen in battle and during natural disasters. Military training involves intensive, stressful conditions, and changes in immune responses have been found in personnel following training. Good oral condition is important for military personnel to fulfill their duties; however, they have difficulty performing daily oral care under training conditions. In this study, we investigated the impact of a 7-day field training on the oral health status of JGSDF personnel by comparing their oral condition before and just after training. The participants were 59 male and 3 female JGSDF personnel undergoing a 7-day field training. All personnel provided informed written consent to participate, and this study was approved by the ethics committee of the Kagoshima University Graduate School of Medical and Dental Sciences. Oral health behaviors before and during the training period were surveyed using a self-administered questionnaire. Dental caries was assessed before training in terms of decayed, missing and filled teeth (DMFT), and periodontal condition was examined before and immediately after training using the community periodontal index (CPI). The presence of eight species of bacteria in dental plaque, including commensal streptococci that are early colonizers on the tooth surface, cariogenic bacteria, and periodontopathic bacteria, was determined using real-time polymerase chain reaction. We also assessed antibacterial factors and a stress marker in saliva samples. Sample collection was performed before and just after training. In addition to difference analysis between groups, logistic regression analysis was performed to examine the association between each health behavior and periodontal deterioration. The frequency of toothbrushing decreased, and snacking increased during the training period. Thirty-five personnel (56.5%) showed an increase in

  15. POWERING AIRPOWER: IS THE AIR FORCES ENERGY SECURE

    Science.gov (United States)

    2016-02-01

    overhead transmission and distribution conductors are exposed. Microgrids offer a control method for utility systems that allow operators to control ... microgrids offer an additional level of control that installations would not otherwise have. For instance, an incident affecting one part of the grid...could cause undue strain on another part that is experiencing a higher power demand. With secure microgrid controls , technicians have the ability to de

  16. Mitigating Corruption in Government Security Forces: The Role of Institutions, Incentives, and Personnel Management in Mexico

    Science.gov (United States)

    2011-01-01

    Yes No Guanajuato 8.6 6.4 5 20 No No Nuevo León 8.6 5.8 5 19 Yes No Sonora 8.6 6.3 7 25 Yes No Jalisco 8.5 6.1 4 15 No No Tabasco 8.5 5.3 5 21 No No...http://www.inegi.org.mx/est/contenidos/ Proyectos /Encuestas/Hogares/regulares/Enigh/Enigh2000/ default.aspx ———, Encuesta Nacional de Ingreso y...Gasto de los Hogares [National Survey of Household Income and Expenditure], 2002. As of April 18, 2011: http://www.inegi.org.mx/est/contenidos/ Proyectos

  17. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    Science.gov (United States)

    2008-12-01

    and the National Guard, which operated in rural areas.”133 A National Intelligence Directorate supported the 60,000 strong security personnel in...Londoño, Juan Luis, Alejandro Gaviria, and Rodrigo Guerrero eds., Asalto al Desarrollo (Washington, D.C.: Inter-American Development Bank, 2000...Guerrero eds., Asalto al desarrollo . Washington, D.C.: Inter-American Development Bank, 2000. “Saca unimpressed with size of U.S. funding.” Latin

  18. Exposure to Prescription Drugs Labeled for Risk of Adverse Effects of Suicidal Behavior or Ideation among 100 Air Force Personnel Who Died by Suicide, 2006-2009

    Science.gov (United States)

    Lavigne, Jill E.; McCarthy, Michael; Chapman, Richard; Petrilla, Allison; Knox, Kerry L.

    2012-01-01

    Prescription drugs for many indications are labeled with warnings for potential risk of suicidal ideation or behavior. Exposures to prescription drugs labeled for adverse effects of suicidal behavior or ideation among 100 Air Force personnel who died by suicide between 2006 and 2009 are described. Air Force registry data were linked to…

  19. Summary of Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-02-01

    Afghan National Police (ANP), which are the Afghan Border Police ( ABP ), Afghan National Civil Order Police (ANCOP), Afghan Uniform Police (AUP...intentionally left blank 43 Acronyms AACP Afghan Anti-Crime Police AAF Afghan Air Force ABP Afghan Border Police ALP Afghan

  20. Establishing Criteria for Assigning Personnel to Air Force Jobs Requiring Heavy Work

    Science.gov (United States)

    1978-07-01

    loads (for example, carrying meat at the slaughterhouse , carrying of sacks, loading wood by hand) wood cutting in the forest by hand tools, agricultural...8217 factor history. Medical Service Digest (United States Air Force), 27(2), 1976, pp. 14-16. 186 Trimeloni, Col. B.D. The Role of Women in the Air Force...Rahden. Effect of training on maximum oxygen intake and on anaerobic metabolism in man. Int. Z. Angew Physiol., 24(2), 1967, pp. 102-110. 188 Wyndham, C.H

  1. The African Standby Force and Regional Security Integration

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    the challenges facing the region? The regional enmities between the states seem to be widespread, deep-rooted and of a nearly chronic nature. In June 2015 the African Union and its member-states announced that they expected the five regionally based standby brigades to be fully operational by December 2015....... The readiness is to be tested at a continental field exercise, Amani Africa 11 to take place in South Africa October 2015. (Defence Web, 2015) The article will start by mapping out the security dynamics and architecture in East Africa, including its membership circles and priorities. The article...

  2. Air Force IT System Security Compliance with Law and Policy

    Science.gov (United States)

    2016-04-01

    monetary burden on 3 system owners as there is “…a significant cost benefit to building in IA during the development phase” 4 of a system. Current...16 Option 4 : Cloud Computing to Eliminate Policy and Methodology Requirements ....17 Option 4 : Application...Assurance ( IA ) (data integrity) to support mission assurance. To ensure IA and to support the mission, changes need to be made to Air Force IT

  3. Personnel Retention Policy and Force Quality: Twice-Passed Staff Sergeants

    Science.gov (United States)

    2015-06-01

    61 Figure 20. Impact of Policy Changes on Average TIG . For Staff Sergeants, average TIG is reduced from 4.4 years to 3.8 years...with a 2P non-retention policy. Sergeants (E5) experience the only other significant reduction in average TIG , which goes from 3.2 years in the base...Warehouse TFRS Total Force Retention System TIG Time in Grade TIS Time in Service VSP Voluntary Separations Pay xxiii EXECUTIVE SUMMARY In

  4. Challenges to United States Tactical Air Force Aircraft Maintenance Personnel: Past, Present and Future

    Science.gov (United States)

    1991-09-01

    study f-ocuses on the most 3 recent changes faced by the TAF rraintenance organization. The last chapter comprares and contrasts the development of... forma - tions. But during the interwar years, both of these missions went into eclipse as doctrinal thinkers established the primacy of bombardment as...i.sninent" (15:4). In response to tho! USAF taskin:g, TAC activated Headquarters Nine- teenth Air force and mr- de it solely reaponsible for planning "for

  5. Enviromental Assessment: Security Forces Regional Training Center at Little Rock Air Force Base Arkansas

    Science.gov (United States)

    2004-07-14

    OMB control number. 1. REPORT DATE 14 JUL 2004 2. REPORT TYPE 3. DATES COVERED 00-00-2004 to 00-00-2004 4. TITLE AND SUBTITLE Enviromental ...civil engineers , services, fliers, maintenance, etc.). The numbers of personnel and types of associated equipment vary based on the functional group...streams or wetlands. Section 404 regulates development in streams and wetlands and requires a permit from the United States Army Corps of Engineers

  6. Inhibiting and driving forces for the digitalization of security systems: security officers’ view on the issue

    OpenAIRE

    Lahtinen, Markus

    2007-01-01

    This memo reports on factors that drive and inhibit the digitalization of security systems. The reported factors are as follows: Technology-push factors • Need to lower costs on the end-user side, i.e. replacing labour with technology • Perceived convenience and ease-of-use of digital systems • Digital products can be connected to the current enterprise network; enabling an expanding set of security features • Firms holding the IP-capability (IP=Internet Protocol) and not h...

  7. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    Science.gov (United States)

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  8. Two 'hot buttons' in gas contracting: security performance and force majeure

    International Nuclear Information System (INIS)

    Park, J.J.

    1996-01-01

    Two important developments in gas contracting issues are the 'force majeure' provisions and security for performance clauses. 'Force majeure' was defined as any acts of God or any acts of omission by a transporter of gas, which is excused by any event not within the control of the party claiming suspension. 'Force majeure' provisions need to be specifically negotiated in every case. These issues often arise in gas contracting situations, but the nature of Canada's non-litigious oil and gas industry is such that we have had little or no Canadian case law to assist in interpreting what these clauses mean. The 'force majeure' clause is basically meant to protect the parties from events outside normal business risk. The security of performance issue arises when the obligation of a supplier of gas to perform, and the obligation of a buyer of gas to pay, is unsecured, as would be the case for example, if one of the parties becomes bankrupt

  9. Environmental Assessment for Proposed Security Forces Operations Facility, Buckley Air Force Base, Colorado

    National Research Council Canada - National Science Library

    Meyer, Elizabeth; Myklebust, Jessica; Denier, James; Christner, Jennifer; Fontaine, Kathyrn

    2006-01-01

    The United States Air Force (USAF) has prepared this EA in accordance with the National Environmental Policy Act to evaluate the potential environmental and social impacts from the construction and operation of the proposed SFOF...

  10. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  11. Auxiliary Armed Forces and Innovations in Security Governance in Mozambique’s Civil War

    NARCIS (Netherlands)

    Jentzsch, C.

    2017-01-01

    Who rules during the civil war? This article argues that the concept of armed group governance must be expanded to include auxiliary armed forces linked to rebels or the government. Comparing the organization of rebel and government auxiliaries, the article demonstrates that security governance

  12. Malaria and mefloquine prophylaxis use among Japan Ground Self-Defense Force personnel deployed in East Timor.

    Science.gov (United States)

    Fujii, Tatsuya; Kaku, Koki; Jelinek, Tomas; Kimura, Mikio

    2007-01-01

    Malaria poses a significant threat to military personnel stationed in endemic areas; therefore, it is important to examine the risks of military operations, particularly in areas where malaria-related data are scarce. The recent deployment of Japan Ground Self-Defense Force (JGSDF) for a peacekeeping operation in East Timor provided an opportunity to investigate these risks. The results of these studies may be translated into chemoprophylactic strategies for travelers. A total of 1,876 members were deployed between April 2002 and September 2003. They consisted of three battalions; each remained for 6 months and was put on mefloquine prophylaxis. Malaria infection was investigated, including exposure to Plasmodium falciparum sporozoites, assessed by seroconversion for anticircumsporozoite (anti-CS) protein antibodies. Adherence to and adverse events (AEs) of mefloquine were studied via questionnaires. Four members were evacuated: one each with optic neuritis, lung cancer with brain metastasis, IgA nephropathy, and psychotic reactions that may have been precipitated by mefloquine. Six clinical episodes of Plasmodium vivax occurred, including one relapse, but there were no clinical cases of P falciparum, yielding a crude malaria attack rate of 0.32% for the 6-month period. Overall, 3.1% of the study population seroconverted for the anti-CS protein antibodies, with some regional differences noted. About 24% of questionnaire respondents, reported AEs; however, none of the AEs was severe. The AEs tended to emerge during the initial doses of chemoprophylaxis. The implementation of mefloquine prophylaxis among JGSDF personnel in East Timor, where P falciparum constitutes a moderate risk, appears to have been a success. Mefloquine prophylaxis was generally safe for Japanese unless predisposed to neuropsychiatric illness. However, given that mefloquine is the only chemoprophylactic agent available, a risk-benefit analysis tailored to the traveler is required for visits to

  13. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  14. Evaluation of the effects of exposure to organic solvents and hazardous noise among US Air Force Reserve personnel

    Directory of Open Access Journals (Sweden)

    Hayley Hughes

    2013-01-01

    Full Text Available Hearing loss affects many workers including those in the military and may be caused by noise, medications, and chemicals. Exposures to some chemicals may lead to an increase in the incidence of hearing loss when combined with hazardous noise. This retrospective study evaluated the risk for hearing loss among Air Force Reserve personnel exposed to occupational noise with and without exposures to toluene, styrene, xylene, benzene, and JP-8 (jet fuel. Risk factors associated with hearing loss were determined using logistic and linear regression. Stratified analysis was used to evaluate potential interaction between solvent and noise exposure. The majority of the subjects were male (94.6% and 35 years or older on the date of their first study audiogram (66%. Followed for an average of 3.2 years, 9.2% of the study subjects had hearing loss in at least one ear. Increasing age (odds ratio [OR] = 1.03 per year of age and each year of follow-up time (OR = 1.23 were significantly associated with hearing loss. Low and moderate solvent exposures were not associated with hearing loss. Linear regression demonstrated that hearing loss was significantly associated with age at first study audiogram, length of follow-up time, and exposure to noise. Hearing decreased by 0.04 decibels for every decibel increase in noise level or by almost half a decibel (0.4 dB for every 10 decibel increase in noise level.

  15. Cross Cultural Awareness in International Military Operation: International Security Assistance Force in Afghanistan

    Directory of Open Access Journals (Sweden)

    Jowita Brudnicka

    2015-12-01

    Full Text Available Multiculturalism defined as a multitude of cultures can be typified as a major trend in international relations, what is a chellenge for every participant of global affairs. The phenomen of multiculturalism is absolutely nothing new, but under conditions of progresive globalisation mechanism its importance has been appreciated.In practise multinational forces have to operate in culturally heterogeneous environment in an array of tasks to combat threats of mostly a non-military transnational nature. All the time there are a highly complex relations within coalition personnel, in cuturally diverse society living in the theatre of operation and between all them mutually.

  16. Role of U.S. Security Assistance in Modernizing the Portuguese Armed Forces: A Historical Analysis.

    Science.gov (United States)

    1986-09-01

    Portuguese Air Force Fiscal Year 1986 IMET/FMS Training Program Security Assistance Management Manual * "Portuguese Navy: A Naval Fleet that is...of the techniques of fiscal management and, within the limits that he had set for the regime, his program of economic recovery succeeded .... What...1984). Currency: Escudo * Agriculture: generally developed; 8.8,% of GDP; main crops - grains, potatoes, olives, grapes (wine); deficit foods - sugar

  17. The Report of the Independent Commission on the Security Forces of Iraq

    Science.gov (United States)

    2007-09-06

    Point of Entry Border Station 7. Taji Camp Taji Counterinsurgency Center for Excelence Iraqi Counterinsurgency Academy Iraqi Military Inteligence ...he serves on the North Carolina Military Foundation and as a director with several private and public businesses . General Charles G. Boyd, USAF...Ret.) General Charles G. Boyd, U.S. Air Force (Ret.), became president and CEO of Business Executives for National Security (BENS) in May of 2002

  18. From Serpent to CEO: Improving First-Term Security Forces Airman Performance Through Neuroscience Education

    Science.gov (United States)

    2017-06-09

    support procedures and decision - making processes. Creating awareness that limitations are present creates a natural motivation to want to reduce...law enforcement decision - making ? What cultural norms within Security Forces should be challenged to improve responses of young adults faced with...enforcement and combat decision - making processes is available. However, it is not uncommon for laboratory discoveries to enter clinical practice, not to

  19. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    Science.gov (United States)

    2002-05-31

    Armed Forces Defence College and during a key note address at the National Security Conference, Malaysian Defense Minister, Dato’ Najib Tun Razak ...Oxford: Oxford University Press, 1999), 197-198. 9Speech by Dato’ Sri Mohd Najib Tun Abdul Razak , “Regional Insecurity: Preparing For Low to High...Resolution 15, No.2, (1971) Dato’ Sri Mohd Najib Tun Razak . “Executive Interview.” Asian Defence Journal (October 2001): 14-16. General Tan Sri Dato

  20. From El Billar to Operations Fenix and Jaque: The Colombian Security Force Experience, 1998-2008

    Science.gov (United States)

    2009-12-01

    577–601. ———. Sostenibilidad De La Seguridad Democratica. Bogotá: Fundadcion Seguridad & Democracia, 23 February 2005. Rempe, Dennis M...Security Force Experience, 1998–2008 Robert D. Ramsey III Occasional Paper 34 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting ...Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be

  1. Cold Vacuum Dryer (CVD) Facility Security System Design Description. System 54

    International Nuclear Information System (INIS)

    WHITEHURST, R.

    2000-01-01

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas

  2. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  3. Legitimacy and Force in International Security : A Regionalist Approach on Multilateralism and the Role of Legitimacy in the Modern World

    OpenAIRE

    Arnesen, Ketil Vike

    2008-01-01

    This thesis will address the issue of legitimacy within international security, with a focus on the use of force by states. Using military force against other actors in the international system will initiate a debate on its perceived legitimacy by several different audiences. This investigation uses the Regional Security Complex Theory of Buzan and Wæver and the assumptions of Idealism to instigate the analytical framework on legitimacy. This thesis will analyse the role and importance of le...

  4. Personnel Investigations and Clearance Tracking (OPI)

    Data.gov (United States)

    Office of Personnel Management — Security file-related information for the U.S. Office of Personnel Management (OPM)'s employee and contractor personnel. The data is OPM-specific, not government-wide.

  5. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  6. Urinary polycyclic aromatic hydrocarbon (OH-PAH) metabolite concentrations and the effect of GST polymorphisms among US Air Force personnel exposed to jet fuel.

    Science.gov (United States)

    Rodrigues, Ema G; Smith, Kristen; Maule, Alexis L; Sjodin, Andreas; Li, Zheng; Romanoff, Lovisa; Kelsey, Karl; Proctor, Susan; McClean, Michael D

    2014-05-01

    To evaluate the association between inhalation exposure to jet propulsion fuel 8 (JP-8) and urinary metabolites among US Air Force (USAF) personnel, and investigate the role of glutathione S-transferase polymorphisms. Personal air samples were collected from 37 full-time USAF personnel during 4 consecutive workdays and analyzed for JP-8 constituents and total hydrocarbons. Pre- and postshift urine samples were collected each day and analyzed for polycyclic aromatic hydrocarbon urinary metabolites. Work shift exposure to total hydrocarbons was significantly associated with postshift urinary 1-naphthol (β = 0.17; P = inhalation exposure to JP-8, which is associated with absorption of JP-8 constituents while performing typical job-related tasks, and in our data the glutathione S-transferase mu-1 polymorphism was associated with differential metabolism of naphthalene.

  7. A Preliminary Assessment of the Regionally Aligned Forces (RAF) Concept’s Implications for Army Personnel Management

    Science.gov (United States)

    2015-01-01

    document is HQD146655. v Contents Preface...characteristics of a full range of countries in a region, however, is probably infeasible. For the moment, we are content to operate on the...27,021, is made up of infantry (CMF 11), followed by supply (92) at 19,264, medical personnel (68) at 13,959, and audiovisual (25) at 16,611

  8. Improved resiliency and well-being among military personnel in a Swedish Naval Force after a counter-piracy operation off the coast of Somalia.

    Science.gov (United States)

    Bäccman, Charlotte; Hjärthag, Fredrik; Almqvist, Kjerstin

    2016-08-01

    The aim of this study was to explore: (1) how the psychological health of the members of the first European Union Naval Force (ME01) was affected by international deployment off the coast of Somalia; and (2) if and how organizational and personal factors (e.g., type of personnel category, previous experiences, and resilience) affected their psychological health and well-being post-deployment. The study had an exploratory longitudinal design, where the participants were assessed both before and after deployment (i.e., T1 and T2). The participants (n = 129, 120 men, 9 women) were equally distributed between officers (n = 68; 64 men, 4 women) and sailors (n = 61; 56 men, 5 women). The members' average age was 31 years, ranging from 20 to 61. For the majority (78%) ME01 was their first international deployment and officers were, in general, more experienced than sailors. The overall results showed that the members' reported a positive experience with improved resilience and well-being (e.g., sense of coherence). However, the result also showed that type of personnel category (i.e., officer or sailor) affected their psychological health. Why and how these differences among military personnel arise is discussed, but deserves further attention. © 2016 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  9. A predeployment trauma team training course creates confidence in teamwork and clinical skills: a post-Afghanistan deployment validation study of Canadian Forces healthcare personnel.

    Science.gov (United States)

    McLaughlin, Thomas; Hennecke, Peter; Garraway, Naisan Robert; Evans, David C; Hameed, Morad; Simons, Richard K; Doucet, Jay; Hansen, Daniel; Annand, Siobhan; Bell, Nathaniel; Brown, D Ross

    2011-11-01

    The 10-day Intensive Trauma Team Training Course (ITTTC) was developed by the Canadian Forces (CFs) to teach teamwork and clinical trauma skills to military healthcare personnel before deploying to Afghanistan. This article attempts to validate the impact of the ITTTC by surveying participants postdeployment. A survey consisting of Likert-type multiple-choice questions was created and sent to all previous ITTTC participants. The survey asked respondents to rate their confidence in applying teamwork skills and clinical skills learned in the ITTTC. It explored the relevancy of objectives and participants' prior familiarity with the objectives. The impact of different training modalities was also surveyed. The survey showed that on average 84.29% of participants were "confident" or "very confident" in applying teamwork skills to their subsequent clinical experience and 52.10% were "confident" or "very confident" in applying clinical knowledge and skills. On average 43.74% of participants were "familiar" or "very familiar" with the clinical topics before the course, indicating the importance of training these skills. Participants found that clinical shadowing was significantly less valuable in training clinical skills than either animal laboratory experience or experience in human patient simulators; 68.57% respondents thought that ITTTC was "important" or "very important" in their training. The ITTTC created lasting self-reported confidence in CFs healthcare personnel surveyed upon return from Afghanistan. This validates the importance of the course for the training of CFs healthcare personnel and supports the value of team training in other areas of trauma and medicine.

  10. Urinary Polycyclic Aromatic Hydrocarbon (OH-PAH) Metabolite Concentrations and the Effect of GST Polymorphisms Among US Air Force Personnel Exposed to Jet Fuel

    Science.gov (United States)

    Rodrigues, Ema G.; Smith, Kristen; Maule, Alexis L.; Sjodin, Andreas; Li, Zheng; Romanoff, Lovisa; Kelsey, Karl; Proctor, Susan; McClean, Michael D.

    2016-01-01

    Objective To evaluate the association between inhalation exposure to jet propulsion fuel 8 (JP-8) and urinary metabolites among US Air Force (USAF) personnel, and investigate the role of glutathione S-transferase polymorphisms. Methods Personal air samples were collected from 37 full-time USAF personnel during 4 consecutive workdays and analyzed for JP-8 constituents and total hydrocarbons. Pre- and postshift urine samples were collected each day and analyzed for polycyclic aromatic hydrocarbon urinary metabolites. Results Work shift exposure to total hydrocarbons was significantly associated with postshift urinary 1-naphthol (β = 0.17; P = <0.0001), 2-naphthol (β = 0.09; P = 0.005), and 2-hydroxyfluorene concentrations (β = 0.08; P = 0.006), and a significant gene-environment interaction was observed with glutathione S-transferase mu-1. Conclusions USAF personnel experience inhalation exposure to JP-8, which is associated with absorption of JP-8 constituents while performing typical job-related tasks, and in our data the glutathione S-transferase mu-1 polymorphism was associated with differential metabolism of naphthalene. PMID:24806557

  11. Demonstration of Security Benefits of Renewable Generation at FE Warren Air Force Base

    International Nuclear Information System (INIS)

    Warwick, William M.; Myers, Kurt; Seifert, Gary

    2010-01-01

    Report detailing field demonstration of security benefits of renewable generation at FE Warren Air Force Base. The 2006 National Defense Appropriations Act directed the Department of Defense (DOD) to coordinate the testing of a wind turbine (new to the U.S. market) at an Air Force installation as a follow on to analyses conducted by the Pacific Northwest National Laborabory (PNNL) as part of the 2005 DOD Renewable Assessment. The earlier study simulated the performance of renewable power produced from wind turbines, solar photovoltaics and geothermal energy as part of a Base-wide energy security solution. The simulation concluded that integration of renewable generating resources with emergency generators, typically diesel-fired, could significantly enhance energy security and extend power supplies during prolonged commercial grid power outages. A simulation is insufficient to convince skeptics of the reliability of renewable resources, especially those that produce power only intermittently, like wind and solar. Therefore, Congress requested a field demonstration be performed using a wind turbine because wind power is the most erratic of all renewable resources. Following this direction, the Air Force identified a site for the wind turbine demonstration and contracted with the Idaho National Laboratory (INL) and PNNL to conduct the demonstration and implement other provisions in the appropriation bill. INL identified a wind turbine that met the legislative requirements (the Gamesa G-80), and with the support of PNNL and the Air Force, selected FE Warren Air Force Base for the demonstration. FE Warren has an excellent wind resource and was already a host to two wind turbines and could accommodate a third. The G-80 is rated at 2 MWs versus the two existing 660 kW turbines, consequently wind production would more than double. Procurement, siting, and acceptance testing of the new turbine was completed in early 2010. The field test was conducted in late April 2010

  12. EKSISTENSI BANTUAN HUKUM TERHADAP PRAJURIT TNI SEBAGAI PELAKU TINDAK PIDANA DAN PRAKTIKNYA / The Existence And Practice Of Legal Assistance To Indonesian National Armed Forces Personnel As Criminal Offender

    Directory of Open Access Journals (Sweden)

    Tumbur Palti D Hutapea

    2016-11-01

    Full Text Available Bantuan Hukum merupakan bantuan yang diberikan oleh seorang ahli di bidang hukum atau penasihat hukum kepada seorang yang terkena masalah hukum di setiap tahapan pemeriksaan baik di luar maupun di dalam pengadilan. Peranan bantuan hukum bagi Prajurit TNI sangat diperlukan dalam menghadapi permasalahan hukum yang dihadapinya. Peraturan perundang-undangan yang mengatur bantuan hukum di lingkungan TNI sepanjang sejarah berdirinya TNI telah mengutamakan bantuan hukum yang berasal dari internal TNI berdasarkan perintah di mana personilnya belum memiliki akreditasi/sertifikasi, sehingga kalangan eksternal sulit memasuki lingkungan hukum militer sebab harus memperoleh izin Perwira Penyerah Perkara (Papera. Perlunya prioritas percepatan RUU tentang Peradilan Militer yang salah satunya merevisi aturan pemberian bantuan hukum kepada Prajurit TNI. Selanjutnya diperlukan kebebasan memilih dan menetapkan layanan bantuan hukum dari advokat profesional atau dengan menggunakan sarana posbakum, khususnya perkara yang diancam pidana mati dan pidana tambahan berupa pemecatan dari dinas militer.   Legal assistance is an assistance given by an expertise in law area or legal advisors to those who have legal problems at every stage of investigation both outside and inside the court. The role of legal assistance for Indonesian National Armed Forces personnel is important. The Legislation covering legal assistance in the Indonesian National Armed Forces community throughout the history has prioritized internal legal assistance where the personnel itself does not have certification/ accreditation for it. The external is hard to get involve and have to obtain special permission from the Officers hand the case (Papera. Accelerating the Bill on Military Justice to revise the rules on providing legal assistance to Army personnel is priority. Furthermore, the necessary freedom to choose and establish legal assistance services of a professional advocate or by means POSBAKUM

  13. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  14. Personnel Security Clearances: Additional Guidance and Oversight Needed at DHS and DOD to Ensure Consistent Application of Revocation Process

    Science.gov (United States)

    2014-09-01

    component, which provides an important check against unfairness and the taint of undue influence. These officials stated that having decision makers...removals, suspensions of more than 14 days, reductions in grade or pay , furloughs of 30 days or less, performance-based removals or reductions in grade...denials of within-grade salary increases, reduction-in-force actions, and OPM suitability determinations. 70See Department of Navy v. Egan, 484 U.S

  15. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    International Nuclear Information System (INIS)

    Koh, Moonsung; Jung, Myungtak

    2015-01-01

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities

  16. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Jung, Myungtak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities.

  17. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  18. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  19. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong

    2015-12-03

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI), conventional CJD using self-interference cancelation at the destination is efficient when the untrusted relay has no capability to suppress the jamming signal. However, if the source and destination are equipped with a single antenna and the only untrusted relay is equipped with N multiple antennas, it can remove the jamming signal from the received signal by linear filters and the full multiplexing gain of relaying cannot be achievable with the conventional CJD due to the saturation of the secrecy rate at the high transmit power regime. We propose in this paper new CJD scheme where neither destination nor relay can acquire CSI of relay-destination link. Our proposed scheme utilizes zero-forcing cancelation based on known jamming signals instead of self-interference subtraction, while the untrusted relay cannot suppress the jamming signals due to the lack of CSI. We show that the secrecy rate of the proposed scheme can enjoy a half of multiplexing gain in half-duplex relaying while that of conventional CJD is saturated at high transmit power for N ???2. The impact of channel estimation error at the destination is also investigated to show the robustness of the proposed scheme against strong estimation errors.

  20. Mobile Detection Assessment and Response Systems (MDARS): A Force Protection, Physical Security Operational Success

    National Research Council Canada - National Science Library

    Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian

    2006-01-01

    ... & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities...

  1. Modernization of the Indian Air Force: Security Implications for South Asia

    National Research Council Canada - National Science Library

    2005-01-01

    This thesis analyzes the Indian Air Force's (IAF) robust modernization campaign and explores why the IAF is on the path to transforming itself from an air force dedicated to air defense to one capable of global force projection...

  2. Air Force Health Study. An Epidemiologic Investigation of Health Effects in Air Force Personnel Following Exposure to Herbicides. First Followup Examination Results. Volume 1

    Science.gov (United States)

    1987-10-01

    include actinic elastosis,,ape scars, disfigurement, excessive hair growth , and Peyronie’s disease. Severe chloracne is often accom- panied by acute...differences between the Ranch vii Hands and the Comparisons, and these differances vera not traditional indi- cators of dioxin-related disease. Both the...Investigation Dioxis* alo Sadmilfr-iis&R"Bn 05bi 40 ormang Air Force Nealta Study Morbidity * tG* 1 AI IA C8000 so *wow 4440" O*e*MV IVea =7Win ee-" * This

  3. The Gap in Operation and Maintenance of the Afghan National Security Forces Infrastructure

    Science.gov (United States)

    2013-05-22

    organizations. They include the Afghan Border Police ( ABP ), the Afghan Uniform Police (AUP), the Afghan Highway Police (AHP), and the Criminal...other elements under the ANP include the Afghan Border Police ( ABP ), the Afghan Uniformed Police (AUP), the Afghan Highway Police (AHP) and the...delineates the authorized personnel and equipment for the army. The ANP tashkil delineates the authorized personnel and equipment for the AUP, ABP , AHP, and

  4. Personnel monitoring

    International Nuclear Information System (INIS)

    1965-01-01

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  5. Personnel monitoring

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1966-12-31

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  6. The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions

    Science.gov (United States)

    2013-12-10

    should bind PSCs actions.21 This document laid out guiding principles and best practices but fell...use the terms in this 28Stanley, 168. 29Major Kevin Clarke, “ Microeconomics , Private Security and the Significance to Operational Planning...Clarke, Kevin. “ Microeconomics , Private Security and the Significance to Operational Planning.” Master’s thesis, School of Advanced Military Studies

  7. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  8. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's manual for the training of SNM guards. Covered are: self-defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  9. CD-ROM nutrient analysis database assists self-monitoring behavior of active duty Air Force personnel receiving nutrition counseling for weight loss.

    Science.gov (United States)

    Heetderks-Cox, M J; Alford, B B; Bednar, C M; Heiss, C J; Tauai, L A; Edgren, K K

    2001-09-01

    This study observed the effect of using a computerized vs manual method of self-monitoring among Air Force personnel receiving nutrition counseling for weight loss. Subjects who enrolled during the first 2 weeks of the 4-week recruitment period completed food records for 6 weeks using a CD-ROM nutrient database (intervention group) whereas those who enrolled during the last 2 weeks used a food record booklet (comparison group). Of the 42 subjects (n = 23 intervention group and n = 19 comparison group), only 113 intervention and 11 comparison group subjects (57% of study enrollees) submitted at least 1 food record during the study and were included in the analysis, which included review of pre- and poststudy questionnaires, food records, and focus group data. There were no significant differences between the number of days per week documented or average number of items recorded daily. All 9 intervention as compared to 2 comparison group subjects who completed a poststudy questionnaire searched for lower-energy and lower-fat items and reported changing their dietary intake as a result. All intervention group subjects who participated in a focus group (n=6) had favorable comments about using the CD-ROM for monitoring and changing eating habits, indicating that it is a beneficial self-monitoring tool. Participants enjoyed the immediate dietary feedback, and computerized food records may be easier to interpret by nutrition counselors. A number of computerized nutrient databases are available to assist patients and consumers in managing nutritional concerns.

  10. Forced Engagements: Water Security and Local Rights Formalization in Yanque, Colca Valley, Peru

    NARCIS (Netherlands)

    Boelens, R.A.; Seemann, M.

    2014-01-01

    For vulnerable groups in society, water insecurity and deficient water availability for food production commonly reflect unequal distribution of water volumes, quality, and services within unequal power structures. Water security is necessarily a political dilemma. Policy debates, however, tend to

  11. The National Guard Meeting Its Obligation to Provide Capable Forces for Homeland Security

    National Research Council Canada - National Science Library

    Sellars, Thomas J

    2006-01-01

    ... (warfighting versus domestic support/homeland security) be harmonized to best posture the Guard to meet both its state obligations and at the same time continue to play a pivotal role in joint warfighting and stability operations...

  12. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  13. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong; Alouini, Mohamed-Slim

    2015-01-01

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI

  14. It’s Not New: Historical U.S. Army Security Forces Assistance Efforts

    Science.gov (United States)

    2012-12-06

    obligation.30 In a recent article published by Small Wars Journal, Kip Whittington , a research associate at the National Defense University...operations in Afghanistan, Whittington believes that building capable indigenous national security institutions meets U.S. and international security...29Ibid., 11. 30Ibid. 31Kip Whittington , “An Afghanistan Without Institutions: A World Without Rest,” Small Wars Journal 8, no. 2 (February 2012

  15. A Security Compliance Study of the Air Force Data Services Center Multics System

    Science.gov (United States)

    1976-12-01

    with thPpate T DErscit requiyfremns oanswe this qungeeto AFysC comsinepo netk alestdroi cosms ivtisicn Afetrs oteAF)CMtcsyswIthteapial Manualm 52ir... effect on them, since AFDSC already has a secure environment. Therefore, requirements for physical security and administrative policy are only reviewed...if the addition of Multics might have some effect on the controls already in effect at the AFDSC. The remainder of this report is divided into two

  16. A Full Cost Analysis of the Replacement of Naval Base, Guantanamo Bay's Marine Ground Defense Force by the Fleet Antiterrorism Security Team

    National Research Council Canada - National Science Library

    Ordona, Placido

    2000-01-01

    ... of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller...

  17. Military personnel recognition system using texture, colour, and SURF features

    Science.gov (United States)

    Irhebhude, Martins E.; Edirisinghe, Eran A.

    2014-06-01

    This paper presents an automatic, machine vision based, military personnel identification and classification system. Classification is done using a Support Vector Machine (SVM) on sets of Army, Air Force and Navy camouflage uniform personnel datasets. In the proposed system, the arm of service of personnel is recognised by the camouflage of a persons uniform, type of cap and the type of badge/logo. The detailed analysis done include; camouflage cap and plain cap differentiation using gray level co-occurrence matrix (GLCM) texture feature; classification on Army, Air Force and Navy camouflaged uniforms using GLCM texture and colour histogram bin features; plain cap badge classification into Army, Air Force and Navy using Speed Up Robust Feature (SURF). The proposed method recognised camouflage personnel arm of service on sets of data retrieved from google images and selected military websites. Correlation-based Feature Selection (CFS) was used to improve recognition and reduce dimensionality, thereby speeding the classification process. With this method success rates recorded during the analysis include 93.8% for camouflage appearance category, 100%, 90% and 100% rates of plain cap and camouflage cap categories for Army, Air Force and Navy categories, respectively. Accurate recognition was recorded using SURF for the plain cap badge category. Substantial analysis has been carried out and results prove that the proposed method can correctly classify military personnel into various arms of service. We show that the proposed method can be integrated into a face recognition system, which will recognise personnel in addition to determining the arm of service which the personnel belong. Such a system can be used to enhance the security of a military base or facility.

  18. Independent Auditors Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund

    Science.gov (United States)

    2015-07-31

    Independent Auditor’s Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces...Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund (Report No. DODIG-2015-154) We are providing this...046, “Independent Auditor’s Report on the Examination of DoD Execution of North Atlantic Treaty Organization Contributing Countries’ Donations to

  19. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  20. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    Science.gov (United States)

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts

  1. Impact of market forces on security of supply; Markedsgoerelse af forsyningssikkerhed

    Energy Technology Data Exchange (ETDEWEB)

    Klinge Jakobsen, H.; Kromann, M.T.; Hoermann, M. (and others)

    2010-05-15

    Marketisation of security of supply can result in efficiency in the overall energy system and cost savings for end users. The analyses show that savings may be gained, particularly in connection with the part of security of supply which is about sufficiency. With modern metering and communication equipment, it is realistic that all consumers have the opportunity to express an upper limit on the price of electricity. In the near future, selected consumption may be turned off at extremely high prices. Those parts of the security of supply, that relates to local networks and that are of the nature of a collective benefit, may be more difficult to make market-oriented. There is, however, already some marketisation, as firms with particularly critical use of electricity invest in backup power plants. The report describes methods for the regulation of grid companies, including cost control, which gives them an incentive to balance the investment in improvements to the security of supply against the cost. Marketisation of security of supply can be done in several steps. Here the following steps are analyzed: a) Cost visibility and reduction; b) Establishment of level of security of supply based on consumer preferences (cost of losses); c) Security of supply varying between consumers, duration and timing; d) Individual level of security of supply. It is at present generally difficult to judge how many of these steps it is appropriate to take. 3 simplistic cases are made of power reserves, transmission and distribution, which indicate how the costs of security of supply can be weighed against advantages. In all three cases it is concluded that supply element has costs for the consumers, but in a magnitude which might well be justified in relation to the benefits. The level of detail in the cases does not, however, justify actual conclusions about the relationship between costs and benefits. It is confirmed in this project through model analysis that savings can be achieved

  2. The Law of Force or The Force of Law: Does Following The Rule of Law Assist Security Forces in Defeating an Armed Insurgency?

    Science.gov (United States)

    2012-06-08

    and Policy in International Relations (Spring): 40-79 Arendt , Hannah . 1963. On revolution. New York: Viking Cohen, Eliot A., John Horvath, and...conditions, where the armed forces can be trusted to obey the civil authorities” ( Arendt 1965, 40). This is especially the case in countries where

  3. What Roles and Missions for Europe’s Military and Security Forces in the 21st Century?

    Science.gov (United States)

    2005-08-01

    Studies Dr. John L. Clarke vi Executive Summary Are armies the dinosaurs of the 21st Century, soon to become extinct in the new security environment? What...and 40-year old weapons systems. Dr. John L. Clarke 6 For many reasons , Europe’s armed forces are in a long-term period of decline, and this trend is...in a reasonable period of time and on a high level of interoperability. The capability of carrying out sophisticated operations with a high operational

  4. Development of an Information Security Awareness Training Program for the Royal Saudi Naval Forces (RSNF)

    National Research Council Canada - National Science Library

    Alageel, Sami

    2003-01-01

    The Royal Saudi Naval Forces (RSNF) are vulnerable to the same kinds of threats to its information infrastructure as the rest of the industrialized nations, As an officer in the RSNF, I am familiar with the special information...

  5. Building Partner Capacity/Security Force Assistance: A New Structural Paradigm

    National Research Council Canada - National Science Library

    Wuestner, Scott G

    2009-01-01

    ...), which would function much like our military reserve. It would ease the burden on the Armed Forces by allowing the hiring of civilians with critical skills to serve on missions abroad when America needs...

  6. Delay to mental healthcare in a cohort of Canadian Armed Forces personnel with deployment-related mental disorders, 2002–2011: a retrospective cohort study

    Science.gov (United States)

    Boulos, David; Zamorski, Mark A

    2016-01-01

    Objective To assess whether the delay to care among Canadian Armed Forces (CAF) personnel who sought care for a mental disorder changed over time and in association with CAF mental health system augmentations. Design A stratified, random sample (n=2014) was selected for study from an Afghanistan-deployed cohort (N=30 513) and the 415 (weighted N=4108) individuals diagnosed with an Afghanistan service-related mental disorder were further assessed. Diagnosis-related data were abstracted from medical records (22 June 2010 to 30 May 2011). Other data were extracted from administrative databases. Delay to care was assessed across five mental health system eras: 2002/2004, 2005/2006, 2007, 2008 and 2009/2010. Weighted Cox proportional hazards regression assessed the association between era, handled as a time-dependent covariate, and the outcome while controlling for a broad range of potential confounders (ie, sociodemographic, military and clinical characteristics). Taylor series linearisation methods and sample design weights were applied in generating descriptive and regression analysis statistics. Primary outcome The outcome was the delay to mental healthcare, defined as the latency from most recent Afghanistan deployment return date to diagnosis date, among individuals with an Afghanistan service-related mental disorder diagnosis. Results Mean delay to care was 551 days (95% CI 501 to 602); the median was 400 days. Delay to care decreased in subsequent eras relative to 2002/2004; however, only the most recent era (2009/2010) was statistically significant (adjusted HR (aHR): 3.01 (95% CI 1.91 to 4.73)). Men, operations support occupations, higher ranks, non-musculoskeletal comorbidities and fewer years of military service were also independently associated with longer delays to care. Conclusions CAF mental health system changes were associated with reduced delays to mental healthcare. Further evaluation research is needed to identify the key system changes that

  7. Traumatic events, other operational stressors and physical and mental health reported by Australian Defence Force personnel following peacekeeping and war-like deployments

    Directory of Open Access Journals (Sweden)

    Waller Michael

    2012-07-01

    Full Text Available Abstract Background The association between stressful events on warlike deployments and subsequent mental health problems has been established. Less is known about the effects of stressful events on peacekeeping deployments. Methods Two cross sectional studies of the Australian Defence Force were used to contrast the prevalence of exposures reported by a group deployed on a peacekeeping operation (Bougainville, n = 1704 and those reported by a group deployed on operations which included warlike and non-warlike exposures (East Timor, n = 1333. A principal components analysis was used to identify groupings of non-traumatic exposures on deployment. Multiple regression models were used to assess the association between self-reported objective and subjective exposures, stressors on deployment and subsequent physical and mental health outcomes. Results The principal components analysis produced four groups of non-traumatic stressors which were consistent between the peacekeeping and more warlike deployments. These were labelled ‘separation’, ‘different culture’, ‘other people’ and ‘work frustration’. Higher levels of traumatic and non-traumatic exposures were reported by veterans of East Timor compared to Bougainville. Higher levels of subjective traumatic exposures were associated with increased rates of PTSD in East Timor veterans and more physical and psychological health symptoms in both deployed groups. In Bougainville and East Timor veterans some non-traumatic deployment stressors were also associated with worse health outcomes. Conclusion Strategies to best prepare, identify and treat those exposed to traumatic events and other stressors on deployment should be considered for Defence personnel deployed on both warlike and peacekeeping operations.

  8. Consequence Management: A Disconnect Between National Security Policy and Force Structure?

    Science.gov (United States)

    2001-03-15

    effects or the consequences of a detonated and/or released weapon(s) has only recently been given much attention. Despite several warnings of the...with the exposure ? Second, the time required to establish and field a regional JTF would prevent the force from having a strong positive effect on the... outcome of the situation. One of the critical missions of a successful consequence management force is its ability to provide a strong deterrent

  9. A fear of coercion and accountability? Security officers and the non-use of force

    NARCIS (Netherlands)

    Eski, Y.

    2017-01-01

    Based on fieldwork among operational security officers working in the Hamburg and Rotterdam ports, it became clear these frontline port policing professionals possess a critical, even fearful attitude towards coercion while performing their duties in the ports. The power of arrest and the

  10. Multiplying a Force for Good? the Impact of Security Sector Management Postgraduate Education in Ethiopia

    Science.gov (United States)

    Macphee, Paula-Louise; Fitz-Gerald, Ann

    2014-01-01

    This paper argues for the importance, benefits and wider impact of a donor-funded, locally supported postgraduate programme in security sector management (SSM) for government officials in Ethiopia. With the exception of specialised education and training programmes within the field of peace and conflict studies, the role of education in…

  11. Personnel Preparation.

    Science.gov (United States)

    Fair, George, Ed.; Stodden, Robert, Ed.

    1981-01-01

    Three articles comprise a section on personnel preparation in vocational education. Articles deal with two inservice programs in career/vocational education for the handicapped and a project to train paraprofessionals to assist special educators in vocational education. (CL)

  12. Energy and Security: future-oriented studies for the Swedish Armed Forces; Energi och saekerhet: framtidsinriktade omvaerldsanalyser foer Foersvarsmakten

    Energy Technology Data Exchange (ETDEWEB)

    Oestensson, Malin; Jonsson, Daniel K.; Magnusson, Roger; Dreborg, Karl Henrik

    2009-01-15

    The report provides a basis for the Armed Forces long-term planning, and how changes in the global energy supply may mean new challenges and threats, as well as the advantages and disadvantages that can be associated with different future energy solutions for Armed Forces own activities, primarily relating to fuel and power during operation. One conclusion is that the potential conflict between energy security and climate-security can lead to far-reaching security implications and that continued global fossil dependency contributes to increased safety of political and military focus on a number of potential conflicts. A new such area may be the Arctic, as in the wake of climate change will become available for exploitation. Large scale global renewable energy can bring greater geographical spread - and reduced pressure on existing 'hot-spots'. Nuclear power is unlikely to be influential in the overall global energy security, but security problems associated with the production of nuclear materials can spread and be strengthened. Furthermore, the energy problems of connected to gaps between rich and poor, which may lead to social friction and conflict. The trend toward increased nationalisation and politicization of the energy is in contrast to free trade and market liberalism and may lead to further militarization of energy resources. Bilateral energy contracts may result in division within the EU and create a hindrance to joint positions and actions, such as in international efforts. As for Armed Forces own future energy solutions, the knowledge of alternative fuels (eg alcohols, diesel variants, gaseous fuels) and energy converters (eg hybrid vehicles, fuel cells) is reviewed. The following alternative principle solutions fuel and power are discussed: 1. Power from small-scale electricity generation via solar cells and small wind farms and power stations with liquid fuel as a supplement. Transport with plug-in hybrid vehicles, i.e. liquid propellants in

  13. Operationalising United Nations Security Council Resolution 1325 within the Australian Defence Force

    Science.gov (United States)

    2016-01-01

    responsibilities. In turn, she goes on to show the upsurge in sectarian violence since 2003 has intensified gender inequality and the future prospects for...security sector reform; disarmament, demobilisation and reintegration; transition assistance; and disaster response. Consideration of the gendered ...There are two key terms used throughout this literature review that need to be defined from the outset: sex and gender . Sex is the anatomy with which

  14. To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation

    Science.gov (United States)

    2015-02-01

    security cooperation mechanisms already in place are evolving into a more sequenced and deliberate plan towards a defined cooperative end state. This...alignment of higher guidance and is designed to advise and guide the command’s activities in the region. Joint in its es- sence , it communicates and...face of crises, it is far better to prevent them from occurring in the first place , establish cooperative arrangements ahead of time, and reduce

  15. Authorization gives the personnel he/she gives the center he/she gives Isotopes for the acting he/she gives tied functions with the security and the radiological protection

    International Nuclear Information System (INIS)

    Perez Pijuan, S.; Hernandez Alvarez, R.; Peres Reyes, Y.; Venegas Bernal, M.C.

    1998-01-01

    The conception is described used in a center production labelled compound and radiopharmaceuticals for the authorization to the support, operation and supervision personnel The approaches are exposed used to define the excellent positions for the security the installation. The are described the training programs, designed starting from the indentification the specific competitions for each duty station and with particular emphasis in the development gives abilities you practice. It is used for the administration and evaluation gives the programs training the Automated System Administration Programs Training (GESAT)

  16. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  17. Strategy of National Cultural Security and Modern Russia «Soft Force»

    Directory of Open Access Journals (Sweden)

    G J Filimonov

    2010-09-01

    Full Text Available Today one of the key factors needed for preservation of the state sovereignty, territorial integrity of the country, consolidation of a society, creation of conditions for the successful decision of internal problems and accordingly occurrence of possibility for conducting by the state of active foreign policy necessity of formation of own strategy of maintenance of national cultural safety and potentials so-called «soft force» appears.

  18. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  19. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  20. Pakistan: Can the United States Secure an Insecure State?

    Science.gov (United States)

    2010-01-01

    do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure

  1. Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR

    KAUST Repository

    Rezki, Zouheir

    2012-04-01

    In this paper, we address the finite Signal-to-Noise Ratio (SNR) Diversity-Multiplexing Tradeoff (DMT) of the Multiple Input Multiple Output (MIMO) wiretap channel, where a Zero-Forcing (ZF) transmit scheme, that intends to send the secret information in the orthogonal space of the eavesdropper channel, is used. First, we introduce the secrecy multiplexing gain at finite-SNR that generalizes the definition at high-SNR. Then, we provide upper and lower bounds on the outage probability under secrecy constraint, from which secrecy diversity gain estimates of ZF are derived. Through asymptotic analysis, we show that the upper bound underestimates the secrecy diversity gain, whereas the lower bound is tight at high-SNR, and thus its related diversity gain estimate is equal to the actual asymptotic secrecy diversity gain of the MIMO wiretap channel. © 2012 IEEE.

  2. Labor Force

    Science.gov (United States)

    Occupational Outlook Quarterly, 2012

    2012-01-01

    The labor force is the number of people ages 16 or older who are either working or looking for work. It does not include active-duty military personnel or the institutionalized population, such as prison inmates. Determining the size of the labor force is a way of determining how big the economy can get. The size of the labor force depends on two…

  3. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-01-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur

  4. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-07-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur. 2 refs

  5. Towards a new approach to the labour law applicable to contractors’ personnel

    CERN Multimedia

    Corinne Pralavorio

    2010-01-01

    On 18 October, CERN and its two Host States will sign agreements on the labour law applicable to the personnel of contractors operating on the CERN site. Once they have entered into force, the agreements will facilitate execution of service contracts for both firms and CERN, and will provide the personnel concerned with better security and more stability.   On 18 October 2010, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. A site that straddles the French-Swiss border makes CERN unique among international organizations. Although this unique characteristic is a fine symbol of international collaboration, it also entails some legal and administrative difficulties. On 18 October, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. This agreement will be supplemented by a bilateral agreement between France and Switzerland amending the 1...

  6. Jamaican Maritime Security. What are the Capability Gaps that Limit the Jamaica Defence Force in the Execution of its Roles in Maritime Security

    Science.gov (United States)

    2017-06-09

    Initiative COA Course of Action DOTMLPF-P Doctrine, Organization, Training, Materiel, Leadership and Education, Personnel, Facilities and Policy...disrupt stability, undermine democratic institutions, and hinder economic growth of the region (UNODC 2012, 15). Over the last decade, Jamaica has...values include democratic choice and political stability in the political area, sustainable development and free enterprise in the economic domain, and

  7. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  8. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  9. A review of video security training and assessment-systems and their applications

    International Nuclear Information System (INIS)

    Cellucci, J.; Hall, R.J.

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups

  10. Catalyst for Change: The Department of Defense as a Forcing Function for the Whole-of-Government Approach

    Science.gov (United States)

    2011-05-24

    Huffingtonpost (24 September 2009). 24 Obama, 3. 13 services, Special Forces, and security personnel. The estimated total number of forces for the...Will Be Required Over Five Years in Afghanistan.” Huffingtonpost , September 12, 2009. Bankus, Brent C., and James Kievit. “The Army and Marines and

  11. An Epidemiologic Investigation of Health Effects in Air Force Personnel Following Exposure to Herbicides. Volume I: 1997 Follow-up Examination Results

    National Research Council Canada - National Science Library

    Michalek, J

    2000-01-01

    .... A Comparison cohort comprised Air Force veterans who served in Southeast Asia during the same time period that the Ranch Hand unit was active and who were not involved with spraying herbicides...

  12. Collective Training and Fielding Opportunities for the Objective Force Maneuver Systems at the Unit of Action Level in a Unit Manning/Unit Replacement Personnel System

    National Research Council Canada - National Science Library

    Courts, Michael

    2003-01-01

    The introduction of Objective Force formations, beginning with the first Unit of Action, will fundamentally change existing organizational structures, training requirements and operational constructs for the U.S. Army...

  13. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  14. Security Force Assistance

    Science.gov (United States)

    2009-05-01

    themselves isolated with great autonomy and no The Advisor 1 May 2009 FM 3-07.1 7-3 supervision. These conditions present moral and ethical dilemmas daily...Group 8-59. Cultures may be individualistic or collectivist in their orientation. An individualist culture is one in which the ties between...individuals are loose—where people are expected to take care of themselves and their immediate families. In a collectivist culture, people are raised from

  15. Institutionalizing Security Force Assistance

    Science.gov (United States)

    2008-05-19

    long before current conflicts developed. An Australian Armoured [sic] Corps Officer with experience in both the Solomon Islands and Iraq noted...and the national level policy. Despite some turnover and changes among the senior military and civilian leadership, the underlying tone has not

  16. Allegiance: Egypt Security Forces

    Science.gov (United States)

    2013-12-01

    Sadat began a policy of economically opening Egypt to the West which led to mandatory subsidy reductions on cooking fuel, rice , bread and other...by a distance from one another. The Emergency Law was not violated, but protestors could look around and see others wearing a black or white shirt...expected after the uprising of 2011 never truly materialized; the Interior Ministry instituted various cosmetic changes, but its basic construct and

  17. Labor Force

    Science.gov (United States)

    Occupational Outlook Quarterly, 2010

    2010-01-01

    The labor force is the number of people aged 16 or older who are either working or looking for work. It does not include active-duty military personnel or institutionalized people, such as prison inmates. Quantifying this total supply of labor is a way of determining how big the economy can get. Labor force participation rates vary significantly…

  18. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  19. Social Security, Cash Payments and Awards to Servicemen of the Red Army Air Force in the Great Patriotic War of 1941–1945

    Directory of Open Access Journals (Sweden)

    Alexander P. Abramov

    2016-07-01

    Full Text Available On the basis of the historical and sociological material presented materials about the Soviet state measures during the Great Patriotic War for the implementation of social policy in respect of the military air force of the Red Army, expressed in monetary incentives, rewards and social guarantees. The author notes that the implementation of social management practices at each stage of warfare timely adjustments depending on acquired combat experience and the strategic objectives of war. Existing wartime monetary awards system and social guarantees in respect of the personnel of the Red Army Air Force was not a major, but significant moral incentive for both pilots, as for representatives of other arms and services.

  20. [Formula: see text]Determination of the smoking gun of intent: significance testing of forced choice results in social security claimants.

    Science.gov (United States)

    Binder, Laurence M; Chafetz, Michael D

    2018-01-01

    Significantly below-chance findings on forced choice tests have been described as revealing "the smoking gun of intent" that proved malingering. The issues of probability levels, one-tailed vs. two-tailed tests, and the combining of PVT scores on significantly below-chance findings were addressed in a previous study, with a recommendation of a probability level of .20 to test the significance of below-chance results. The purpose of the present study was to determine the rate of below-chance findings in a Social Security Disability claimant sample using the previous recommendations. We compared the frequency of below-chance results on forced choice performance validity tests (PVTs) at two levels of significance, .05 and .20, and when using significance testing on individual subtests of the PVTs compared with total scores in claimants for Social Security Disability in order to determine the rate of the expected increase. The frequency of significant results increased with the higher level of significance for each subtest of the PVT and when combining individual test sections to increase the number of test items, with up to 20% of claimants showing significantly below-chance results at the higher p-value. These findings are discussed in light of Social Security Administration policy, showing an impact on policy issues concerning child abuse and neglect, and the importance of using these techniques in evaluations for Social Security Disability.

  1. Traumatic events, other operational stressors and physical and mental health reported by Australian Defence Force personnel following peacekeeping and war-like deployments

    OpenAIRE

    Waller, Michael; Treloar, Susan A; Sim, Malcolm R; McFarlane, Alexander C; McGuire, Annabel C L; Bleier, Jonathan; Dobson, Annette J

    2012-01-01

    Abstract Background The association between stressful events on warlike deployments and subsequent mental health problems has been established. Less is known about the effects of stressful events on peacekeeping deployments. Methods Two cross sectional studies of the Australian Defence Force were used to contrast the prevalence of exposures reported by a group deployed on a peacekeeping operation (Bougainville, n = 1704) and those reported by a group deployed on operations which included warl...

  2. The Role of Physical and Physiological Capacities and Their Modification on the Tolerance to Various Stress Experienced by Air Force Personnel

    Science.gov (United States)

    1984-06-30

    2. To partition the energy utilization during HSG and RTE into oxidation of fat and carbohydrate components; and glycogen utilization and lactate...and physical conditioning. Given the entrance of women into the Air Force Academy and the acknowledged interaction of thermoregulation-dehydration on...basketball, wrestling, soccer and cross-country teams. E-7. CO2 Rebreathing Method The final noninvasive method of assessing cardiac function was the

  3. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  4. 49 CFR 1542.219 - Supplementing law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Supplementing law enforcement personnel. 1542.219 Section 1542.219 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.219 Supplementing law...

  5. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  6. Securing Healthcare’s Quantified-Self Data: A Comparative Analysis Versus Personal Financial Account Aggregators Based on Porter’s Five Forces Framework for Competitive Force

    Science.gov (United States)

    2016-09-01

    PORTER’S FIVE FORCES FRAMEWORK FOR COMPETITIVE FORCES Catherine H. Chiang Management Program Analyst, United States Citizenship and Immigration...2009): 454–66, doi:10.1377/hlthaff.28.2.454. 34 Catherine L. Anderson and Ritu Agarwal, “The Digitization of Healthcare: Boundary Risks, Emotion...allows patterns of distinctive characteristics to be tracked. As more behaviors are digitized , these unique characteristics could easily be used to

  7. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Science.gov (United States)

    2010-01-01

    ... knowledge. 1046.15 Section 1046.15 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF... knowledge. (a) DOE contractors shall only employ as protective force personnel individuals who successfully... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  8. 78 FR 32241 - U.S. Air Force Seeks Industry Input for National Security Space Launch Assessment

    Science.gov (United States)

    2013-05-29

    ..., seeks industry views and perspectives to inform an on-going strategic National Security Space Launch... the U.S. Government. 2. What are the critical issues that concern current and prospective launch...

  9. Corruption in the Kenya Police Force and Impacts on Kenyan Security: Investigating the Need for Police Reforms

    Science.gov (United States)

    2017-03-21

    been using the police culture, philosophy , and organization structure in the Police Service based on the British colonial security system. Such...reflects on the police corruption that wreaks the moral authority of law enforcement; thus, undermining the public trust and confidence in the law...economic growth emphasized in the Kenya’s vision 2030. Since independence, Kenya’s security structure, philosophy , and systems have been inherited and

  10. Counterintelligence Screening Needed lo Reduce Security Threat That Unscreened Local National Linguists Pose to U.S. Forces (REDACTED)

    Science.gov (United States)

    2012-12-07

    Logistics Civil Augmentation Program MEP Mission Essential Personnel MFR Memorandum for Record OCI Organizational Conflict of Interest OCONUS Outside...reports would draw conclusions and recollllllel1dations on the retention, hir.ing, or threat posed by the LNs. MEP would send thjl MFRs to tlie...office responsible for issning badges on the local installations if the MFRs had no negative CI infonnation. If the MFRs had CI exploitable information

  11. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  12. Environmental Assessment: Conversion of the 820th Security Forces Group at Moody AFB, Georgia to a Contingency Response Group

    Science.gov (United States)

    2003-08-01

    Contingency Response Group (CRG) at Moody Air Force Base (AFB), GA . DESCRIPTION OF THE PROPOSED ACTION AND ALTERNATIVES. The United States Air Force...sinkhole formation. 3.5.3.3 Soils Moody AFB Moody AFB is located in the Tifton Upland District of the Lower Coastal Plain. In general, soils on...base. Arsenic, barium, chromium, copper, iron, selenium, and zinc have been found to be naturally occurring in the area. Predominant soils are Tifton

  13. Teamwork and the National Security Personnel System

    National Research Council Canada - National Science Library

    Willoughby, Michael B

    2007-01-01

    .... However, concern exists that only rewarding individual performance may adversely impact teamwork, collaboration, and information sharing, which could ultimately impact organizational performance...

  14. Lift force fluctuations of magnetically levitated vehicles with an integrated synchronous linear motor and their significance for the technical security

    Energy Technology Data Exchange (ETDEWEB)

    Mnich, P; Huebner, K D

    1980-07-15

    In this paper the influence of the motor current on the magnetic force is investigated by an analytical method. With the integrated synchronous linear motor the reactions of the current sheet on the excitation field are depending on the pole angle and the amplitude of the current sheet. For an undisturbed operation - current sheet and induction wave in phase - the influence of the motor current on the magnetic force can be neglected. In case of a disturbed performance, i.e. when the pole angle is changing periodically, fluctuations of the magnetic force will be found. This effect has to be compensated by a reserve magnetic force in the levitation control. With the technical data for the new magnetic levitation pilots plants (International Traffic Fair 1979 at Hamburg and Transrapid - Pilot Plant Emsland) the stated relations are evaluated. Approximated relations for the levitation force are derived. For comparison, a finite-difference computer programme from the 'Institut fuer elektrische Maschinen, Antriebe und Bahnen, Technische Universitaet Braunschweig' is applied. The approximated relations developed in this paper are verified - with a sufficient precision - by the numerical calculations.

  15. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

    OpenAIRE

    Kilcrease, Patrick N.

    2009-01-01

    Approved for public release, distribution unlimited GHOSTNet is a secure and anonymous Virtual Private Network (VPN) service. Coupling Ethernet tunneling and proxy services to provide users safe and anonymous Internet access, GHOSTNet utilizes TLS (SSL) protocol with AES-256 encryption to secure the network along with PKI certificates and HMAC protection from replay attacks and UDP flooding. This thesis will be a system level test and evaluation of the GHOSTNet infrastructure. The primary...

  16. The Visiting Forces Agreement (VFA in the Philippines: Insights on Issues of Sovereignty, Security and Foreign Policy

    Directory of Open Access Journals (Sweden)

    Mark Anthony M. Velasco

    2015-11-01

    Full Text Available The study intends to compare the Visiting Forces Agreement (VFA between the Philippines and the United States of America and the VFA between the Philippines and Australia. The research piece is arranged in the following flow of ideas. The first and the second part provides the foundations by highlighting issues on definition, historical background, provisions of the agreement and concerns faced by the agreement of the Visiting Forces Agreement (VFA between the Republic of the Philippines and the United States of America and the Status of the Visiting Forces Agreement (SOVFA between the Republic of the Philippines and Australia. The third part is an analysis of the VFA and the SOVFA under the tutelage of the framework on the non-intervention principle. As a result, the provisions of SOVFA were in consonance with the legal arrangement in the Philippines than the VFA with the United States of America.

  17. Neutron personnel dosimetry

    International Nuclear Information System (INIS)

    Griffith, R.V.

    1981-01-01

    The current state-of-the-art in neutron personnel dosimetry is reviewed. Topics covered include dosimetry needs and alternatives, current dosimetry approaches, personnel monitoring devices, calibration strategies, and future developments

  18. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  19. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  20. Personnel Monitoring Department - DEMIN

    International Nuclear Information System (INIS)

    1989-01-01

    The activities and purposes of the Personnel Monitoring Dept. of the Institute of Radioprotection and Dosimetry of the Brazilian CNEN are presented. A summary of the personnel monitoring service is given, such as dosemeters supply, laboratorial inspections, and so on. The programs of working, publishing, courses and personnel interchange are also presented. (J.A.M.M.)

  1. Food Preferences of Air Force Enlisted Personnel

    Science.gov (United States)

    1974-08-01

    140 Canned Green Beans o CD®® CD©©®®® ®®®® ©CD®©©®©©®® 141 Apples (fresh) o CD®® CD®©®®® ®©®® ©CD®©©®©®®® 142 Swedish Meatballs o CD...154 Banana Cream Pudding o ©®©®®©®®® C<D®®© ©CD®®©©©©®® 155 Meatball Submarine o ®©®CD®©®®® ®®©® ©CD®®®®®®®® 156 Boston Baked Beans o...CD® 253 Spaghetti with Meatballs o ©CD®® CD©® CD® ©©CD® ©©©©©©©©®® 254 Grilled Ham o ©©®® CD® ©CD CO ®®CD© ©®©®®®®®®® 255 Lemon Chiffon

  2. Norwegian Armed Forces Personnel Recovery Network

    Science.gov (United States)

    2016-12-01

    2010/07/72-villa-voisin.html. 2 In 1945, she was freed, and in 1946, she came to England to receive the George Medal from the King .2 The...DC: Deputy Secretary of Defense, 1988. Combat Search and Rescue (CSAR) Atkinson, Rick. Crusade: The Untold Story of the Persian Gulf War. New York

  3. Partners of Choice and Necessity: Special Operations Forces and the National Security Imperatives of Building Partner Capacity

    Science.gov (United States)

    2015-05-21

    intersection of complexity, social interaction, political violence, and military force. Lastly, I owe a tremendous debt to my wife and family for giving me the...space to pursue these intellectual endeavors while “taking a break” from deployment. In partial payment of that debt , I promise not to mention any...Going Big by Getting Small (Denver, CO: Outskirts Press), 162-163. 12 liberalism.19 From the Greek civil war of the late 1940s to the modern

  4. Personnel preferences in personnel planning and scheduling

    OpenAIRE

    van der Veen, Egbert

    2013-01-01

    Summary The personnel of an organization often has two conflicting goals. Individual employees like to have a good work-life balance, by having personal preferences taken into account, whereas there is also the common goal to work efficiently. By applying techniques and methods from Operations Research, a subfield of applied mathematics, we show that operational efficiency can be achieved while taking personnel preferences into account. In the design of optimization methods, we explicitly con...

  5. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  6. Evaluation of the Nutrition of the Bulgarian Army Military Personnel During the Preparation for Participation in Expeditionary Operations

    Directory of Open Access Journals (Sweden)

    Nichev Nikolay

    2017-12-01

    Full Text Available The development of the military art and of the rapidly changing security environment, define the developing and the formation of new capabilities for their management. The increasing importance of the Expeditionary Forces of NATO demands the developing of the national legislation, connected with the nutrition of the Bulgarian Army military personnel, participating in expeditionary operations. In response to the tasks, delegated to the armed forces during their participation in expeditionary operations, the provision of the units with food becomes a priority logistic capability.

  7. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  8. Evaluation of Agency's Public Personnel Administration

    OpenAIRE

    Neal W. Tamayo

    2017-01-01

    As a consultant for a government agency, this paper will design recommendations and improvements for the agency’s public personnel administration. In order to do this, the consultant has to become familiar with the agency, its departments and also understand the key factors. The department chosen from the government for this paper is the Social Security Administration (Kestenbaum, 2014).

  9. The Intensification of the Personnel Role.

    Science.gov (United States)

    Wangler, Lawrence A.

    1979-01-01

    Discusses personnel profession's increased responsibilities which are due to (1) consolidation of the Equal Employment Opportunity Commission, (2) labor law reform, (3) privacy legislation, (4) social security legislation, (5) open retirement, (6) medical plan costs, (7) codetermination, (8) labor scarcity, (9) top management compensation, and…

  10. 10 CFR 712.16 - DOE security review.

    Science.gov (United States)

    2010-01-01

    ... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file... 10 Energy 4 2010-01-01 2010-01-01 false DOE security review. 712.16 Section 712.16 Energy... Program Procedures § 712.16 DOE security review. (a) A personnel security specialist will perform a...

  11. Joining forces for food security - Linking earth observation and crowd-sourcing for improved decision-support to aid organizations

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Pham, P.

    2013-12-01

    Droughts statistically exceed all other natural disasters in spatio-temporal extent, number of people affected or financial loss. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. Consequently, this study is focused on two complementary developments - a new satellite-derived agricultural drought index and a mobile phone application. The Combined Drought Index (CDI) is enhanced by replacing field measurements of temperature and rainfall modelled/assimilated data. The vegetation component is replaced by a smoothed NDVI dataset. A soil moisture component is introduced to close the gap between rainfall deficiencies and the first visible impacts of atmospheric anomalies on vegetation. The mobile phone application enables the validation of drought index outputs and gives aid organizations an opportunity to increase the speed of socio-economic vulnerability assessments. Supported by Doctors without Borders (MSF) this approach aims at decreasing uncertainties in decision-making via a more holistic risk framework.

  12. Security Force Assistance and Security Sector Reform

    Science.gov (United States)

    2013-09-01

    regional trade, on the region’s tourism and fish- ing industries, and on food prices.”42 Other ungoverned maritime territory attractive to illicit...Verde, Mali, Benin, Togo, and Ghana. Drugs from Colombia and Peru , which often transit through Brazil, are shipped across the Atlantic and enter...intrastate struggles that pitted ideological movements against regimes they sought to change. These included Sendero Luminoso in Peru , the Farabundo

  13. Rebuilding Iraq: DoD and State Department Have Improved Oversight and Coordination of Private Security Contractors in Iraq, but Further Actions are Needed to Sustain Improvements

    Science.gov (United States)

    2008-07-01

    MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and

  14. Personnel preferences in personnel planning and scheduling

    NARCIS (Netherlands)

    van der Veen, Egbert

    2013-01-01

    Summary The personnel of an organization often has two conflicting goals. Individual employees like to have a good work-life balance, by having personal preferences taken into account, whereas there is also the common goal to work efficiently. By applying techniques and methods from Operations

  15. Forced Shortsightedness: Security Force Assistance Missions

    Science.gov (United States)

    2014-06-01

    accomplished something no other al-Qaeda franchise has ever been able to pull off: conquering and governing a broad swath of a sovereign country, then...marginalized and disadvantaged .”58 Boko Haram has capitalized on the increasing north-south divide and subsequently has increased the frequency and...groups.”70 VENs, such as AQIM and Boko Haram, are internal threats competing for victory over the people and taking advantage of the lack of

  16. Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2005-03-01

    "Train the way you will fight" has been a guiding principle for military training and has served the warfighter well as evidenced by numerous successful operations over the last decade. This need for realistic training for all combatants has been recognized and proven by the warfighter and continues to guide military training. However, to date, this key training principle has not been applied fully in the arena of cyberwarfare due to the lack of realistic, cost effective, reasonable, and formidable cyberwarfare opponents. Recent technological advances, improvements in the capability of computer-generated forces (CGFs) to emulate human behavior, and current results in research in information assurance and software protection, coupled with increasing dependence upon information superiority, indicate that the cyberbattlespace will be a key aspect of future conflict and that it is time to address the cyberwarfare training shortfall. To address the need for a cyberwarfare training and defensive testing capability, we propose research and development to yield a prototype computerized, semi-autonomous (SAF) red team capability. We term this capability the Cyber Warfare Opposing Force (CW OPFOR). There are several technologies that are now mature enough to enable, for the first time, the development of this powerful, effective, high fidelity CW OPFOR. These include improved knowledge about cyberwarfare attack and defense, improved techniques for assembling CGFs, improved techniques for capturing and expressing knowledge, software technologies that permit effective rapid prototyping to be effectively used on large projects, and the capability for effective hybrid reasoning systems. Our development approach for the CW OPFOR lays out several phases in order to address these requirements in an orderly manner and to enable us to test the capabilities of the CW OPFOR and exploit them as they are developed. We have completed the first phase of the research project, which

  17. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  18. Personnel Policy and Profit

    DEFF Research Database (Denmark)

    Bingley, Paul; Westergård-Nielsen, Niels Chr.

    2004-01-01

    personnel structure variation. It is found that personnel policy is strongly related to economic performance. At the margin, more hires are associated with lower profit, and more separations with higher profit. For the average firm, one new job, all else equal, is associated with ?2680 (2000 prices) lower...

  19. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  20. Automating the personnel dosimeter monitoring program

    International Nuclear Information System (INIS)

    Compston, M.W.

    1982-12-01

    The personnel dosimetry monitoring program at the Portsmouth uranium enrichment facility has been improved by using thermoluminescent dosimetry to monitor for ionizing radiation exposure, and by automating most of the operations and all of the associated information handling. A thermoluminescent dosimeter (TLD) card, worn by personnel inside security badges, stores the energy of ionizing radiation. The dosimeters are changed-out periodically and are loaded 150 cards at a time into an automated reader-processor. The resulting data is recorded and filed into a useful form by computer programming developed for this purpose

  1. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    system force and structure reliance – are discovered and tantamount with EU nations. Thusly I indicated reason viewpoints and figures of security of data structures it additionally relates to the reason of estimation of transient dangers of security of frameworks for that I begin my proposal with one of the fundamental class of data security which is Cyber security. Keyword : Cyber Security, IT

  2. 78 FR 35042 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2013-06-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0407] Merchant Marine Personnel... Labor Organization's Maritime Labour Convention, 2006.'' This meeting will be open to the public. DATES... words ``Department of Homeland Security'' and the docket number for this action. Comments received will...

  3. The Politics of Security Deployment of Security Operatives to Jos Metropolis, Plateau State, Nigeria 2001-2014

    Directory of Open Access Journals (Sweden)

    Dantani Umar

    2017-01-01

    Full Text Available The paper examines the politics of security deployment by the Federal Government of Nigeria to Jos, metropolis. A cross-sectional study was conducted and Public Opinion Theory adopted. Methodologically, mixed methods of data collection were conducted that involved the administration of 377 questionnaires to adult respondents, six In-Depth Interviews with religious and community leaders while three Key Informant Interviews with security personnel working with Special Task Force. The survey reveals that, the deployment of Mobile Police from 2001-2010 and the formation of Special Task Force in 2010 has generated mixed reactions and divergent perceptions among the residents of Jos metropolis. Majority of the ethnic groups that are predominantly Christians were more contented with the deployment of the Mobile Police whereas ethnic groups that are dominantly Muslims questioned the neutrality, capability, performance and strength of the Nigerian Police Force in managing the crises. The study recommends that, security personnel should display high degree of neutrality in order to earn the confidence of the residents and change their perceptions.

  4. Training of nonlicensed personnel

    International Nuclear Information System (INIS)

    Hetrick, D.E.

    1975-01-01

    The safety and efficiency with which a station operates is a function of the competence and proficiency of all personnel. This includes the nonlicensed personnel who make up the bulk of the station staff. Thus the training of these members of the station complement is an important function in overall station performance. Standards, regulations, regulatory guides, and codes provide guidance to the training requirements for such personnel. Training needs and objectives must be established, a plan prepared and then all incorporated into a training program. A well planned and operated training program will stimulate effective communications between the different groups within the station and between the station and off site support groups

  5. professional status and the personnel functionary in the sadf

    African Journals Online (AJOL)

    PROFESSIONAL STATUS AND THE. PERSONNEL FUNCTIONARY IN THE SADF. By R Adm R. Eberlein*. Introduction. During the last year or so there has developed an increasing awareness among personnel functionaries in the SA Defence Force of a move- ment aimed at obtaining recognition of the pro- fessional ...

  6. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    Science.gov (United States)

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  7. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  8. Analysis of Department of Defense social media policy and its impact on operational security

    OpenAIRE

    Leonhardi, Eric V.; Murphy, Mark; Kim, Hannah

    2015-01-01

    Approved for public release; distribution is unlimited The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization’s operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means ...

  9. Civilian Personnel: Career Management

    National Research Council Canada - National Science Library

    2001-01-01

    This revision; (1) Contains changes required by the establishment of a consolidated and realigned management structure for civilian personnel, manpower, and related functions in the Office of the Assistant Secretary of the Army...

  10. Personnel neutron dosimetry

    International Nuclear Information System (INIS)

    Hankins, D.

    1982-04-01

    This edited transcript of a presentation on personnel neutron discusses the accuracy of present dosimetry practices, requirements, calibration, dosemeter types, quality factors, operational problems, and dosimetry for a criticality accident. 32 figs

  11. Personnel dose assignment practices

    International Nuclear Information System (INIS)

    Fix, J.J.

    1993-04-01

    Implementation of DOE N 5480.6 Radiological Control Manual Article 511(3) requirements, to minimize the assignment of personnel dosimeters, should be done only under a broader context ensuring that capabilities are in place to monitor and record personnel exposure both for compliance and for potential litigation. As noted in NCRP Report No. 114, personnel dosimetry programs are conducted to meet four major objectives: radiation safety program control and evaluation; regulatory compliance; epidemiological research; and litigation. A change to Article 511(3) is proposed that would require that minimizing the assignment of personnel dosimeters take place only following full evaluation of overall capabilities (e.g., access control, area dosimetry, etc.) to meet the NCRP objectives

  12. Personnel radiation dosimetry

    International Nuclear Information System (INIS)

    1987-01-01

    The book contains the 21 technical papers presented at the Technical Committee Meeting to Elaborate Procedures and Data for the Intercomparison of Personnel Dosimeters organizaed by the IAEA on 22-26 April 1985. A separate abstract was prepared for each of these papers. A list of areas in which additional research and development work is needed and recommendations for an IAEA-sponsored intercomparison program on personnel dosimetry is also included

  13. [Radiative and hygienic certification in Armed Forces, problems of its implementation and ways of perfection].

    Science.gov (United States)

    Rusakov, V N; Cherkashin, A V; Shishkanov, A P; Ian'shin, L A; Gracheva, T N

    2010-12-01

    Radiative and hygienic passportization is one of the most actual pattern of socio and hygienic monitoring in Armed Forces. Radiative and hygienic passport is the main document which characterizes the safety control in military unit and uses the sources of ionizing radiation. Sanitary and epidemiologic institutions were imputed to control the formation of radiative and hygienic passports, analysis and generalization of its data, formation of conclusions about the condition of radiation security in the military units. According to radiative and hygienic passportization, which took place in 2009, the radiation security in the Armed Forces and organizations is satisfactory, but there are some problems of providing of radiation security of personnel under the professional and medical radiation. The salvation of its problems requires the effective work of official functionary of radiac object and institutions of state sanitary and epidemiological supervision in Armed Forces of Russian Federation.

  14. A personnel TLD system with person identification

    International Nuclear Information System (INIS)

    Widell, C.O.

    1974-01-01

    The TLD system uses Li 2 B 4 O 7 :Mn, Si sintered tablets which are heated by hot nitrogen. The slide which holds the tablets is coded by a self adhesive polyester-aluminium tape. This tape is BCD coded in an ordinary tape punch. The information on the punched tape includes a ten digit social-security number and a two digit information on location and type of dosimetry. By this system dosimetric data is directly transfered into a central dose register for Sweden. All personnel doses are there stored on social-security numbers. (author)

  15. Manpower, Personnel, and Training Assessment (MPTA) Handbook

    Science.gov (United States)

    2015-11-01

    programs. 8. Target Audience Description ( TAD ) The TAD is the initial description of the number and type of personnel required to operate, maintain...requirements, etc.) describing the Soldiers operating or maintaining the system. In cases where operating a system requires a security clearance, the TAD ...Authority. Milestone Decision Authority Target Audience Description ( TAD ) AR 602-2 AR 611-1 DA Pam 611-21 X X X X X X The TAD lists

  16. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  17. Why Security Force Assistance Fails

    Science.gov (United States)

    2016-05-26

    military intervention, along with Rumsfeld’s vision of transformation, permeated the philosophy behind the planning process for invading Iraq.66...accessed March 23, 2016, http://www.pbs.org/wgbh/frontline/ film /rise-of-isis/. 37...Martin Smith. Aired October 28, 2014. Accessed March 23, 2016. http://www.pbs.org/wgbh/frontline/ film /rise-of-isis/. Paul, Christopher et al. What Works

  18. Training of maintenance personnel

    International Nuclear Information System (INIS)

    Rabouhams, J.

    1986-01-01

    This lecture precises the method and means developed by EDF to ensure the training of maintenance personnel according to their initial educational background and their experience. The following points are treated: General organization of the training for maintenance personnel in PWR and GCR nuclear power stations and in Creys Malville fast breeder reactor; Basic nuclear training and pedagogical aids developed for this purpose; Specific training and training provided by contractors; complementary training taking into account the operation experience and feedback; Improvement of velocity, competence and safety during shut-down operations by adapted training. (orig.)

  19. Air Force's Transformation to an Expeditionary Culture

    National Research Council Canada - National Science Library

    Anderson, Richard D

    2007-01-01

    .... In response, leadership developed the Air Expeditionary Force (AEF) whereby units and personnel could schedule training, education, and family events such as holidays, vacations, graduations and weddings...

  20. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (l) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper discusses the various types of security applications that are presently being considered for the above areas and briefly describes a few examples of the application of this technology

  1. Personnel photographic film dosimetry

    International Nuclear Information System (INIS)

    Keirim-Markus, I.B.

    1981-01-01

    Technology of personnel photographic film dosimetry (PPD) based on the photographic effect of ionizing radiation is described briefly. Kinds of roentgen films used in PPD method are enumerated, compositions of a developer and fixing agents for these films are given [ru

  2. Harmonious personnel scheduling

    NARCIS (Netherlands)

    Fijn van Draat, Laurens; Post, Gerhard F.; Veltman, Bart; Winkelhuijzen, Wessel

    2006-01-01

    The area of personnel scheduling is very broad. Here we focus on the ‘shift assignment problem’. Our aim is to discuss how ORTEC HARMONY handles this planning problem. In particular we go into the structure of the optimization engine in ORTEC HARMONY, which uses techniques from genetic algorithms,

  3. Nuclear Test Personnel Review

    Science.gov (United States)

    FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak

  4. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  5. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  6. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  7. Modernization of personnel training

    International Nuclear Information System (INIS)

    Haferburg, M.; Rehn, H.

    1997-01-01

    Personnel training in German nuclear power plants adheres to high standards complying with government regulations. The development of PC technology allows the introduction of new training methods, e.g. computer based training (CBT), as well as their integration into existing systems. In Germany, the operators of nuclear power plants have developed their own computer based standards with a screen design, a hardware platform and an assessment standard. 25% of the theoretical training of the shift personnel is covered by CBT. The CBT-Programmes offer multimedia features: videos, photographs, sound, graphs and switching diagrams of existing systems, practice oriented simulations and 3-D animations. Interaction is the most important attribute of an efficient self-learning-programme. A typical example of such an appropriate theme is the CBT-Lesson ''Pressure Surges in Pipes and Components of Power Plants''. (author)

  8. Do Military Personnel Patent

    Science.gov (United States)

    2016-12-01

    following questions: In what fields are military personnel most likely to patent, and how do demographics, such as age, race, and gender , along with...technologies, which have transformed how the United States wages war. DARPA continues to develop new technologies and capabilities for the U.S. military today...build the European navies so it instead decided to utilize an innovative ship design to exploit a gap specific to the British Royal Navy. The six

  9. Automatic personnel contamination monitor

    International Nuclear Information System (INIS)

    Lattin, Kenneth R.

    1978-01-01

    United Nuclear Industries, Inc. (UNI) has developed an automatic personnel contamination monitor (APCM), which uniquely combines the design features of both portal and hand and shoe monitors. In addition, this prototype system also has a number of new features, including: micro computer control and readout, nineteen large area gas flow detectors, real-time background compensation, self-checking for system failures, and card reader identification and control. UNI's experience in operating the Hanford N Reactor, located in Richland, Washington, has shown the necessity of automatically monitoring plant personnel for contamination after they have passed through the procedurally controlled radiation zones. This final check ensures that each radiation zone worker has been properly checked before leaving company controlled boundaries. Investigation of the commercially available portal and hand and shoe monitors indicated that they did not have the sensitivity or sophistication required for UNI's application, therefore, a development program was initiated, resulting in the subject monitor. Field testing shows good sensitivity to personnel contamination with the majority of alarms showing contaminants on clothing, face and head areas. In general, the APCM has sensitivity comparable to portal survey instrumentation. The inherit stand-in, walk-on feature of the APCM not only makes it easy to use, but makes it difficult to bypass. (author)

  10. Electronic Official Personnel Folder System

    Data.gov (United States)

    US Agency for International Development — The eOPF is a digital recreation of paper personnel folder that stores electronic personnel data spanning an individual's Federal career. eOPF allows employees to...

  11. US Air Force Base Observations

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Hourly observations taken by U.S. Air Force personnel at bases in the United States and around the world. Foreign observations concentrated in the Middle East and...

  12. Qualification of NPP operations personnel

    International Nuclear Information System (INIS)

    Wang Jiao.

    1987-01-01

    Competence of personnel is one of the important problems for safety operation of nuclear power plant. This paper gives a description of some aspects, such as the administration of NPP, posts, competence of personnel, training, assessing the competence and personnel management

  13. Kyrgyzstan’s Fragmented Police and Armed Forces

    Directory of Open Access Journals (Sweden)

    Erica Marat

    2011-03-01

    Full Text Available This article is a first attempt to analyze the underlying reasons behind the unprofessional behavior of the Kyrgyz military and police during ethnic conflict in Osh on June 10-14, 2010. It argues that the higher military leadership in Bishkek shares a common distrust of the Tashkent regime and overall uncertainly about power sharing two months after regime change, while lower level personnel may have provoked the Uzbek minority, because of their nationalist feelings (the majority of police and army personnel are ethnic Kyrgyz and overall frustration with the fragmented political leadership. The situation was further exacerbated by the lack of political control over the security forces and their lack of adequate training to deal with civic unrest.

  14. SOUTH AFRICA AND THE SADC STAND-BY FORCE

    African Journals Online (AJOL)

    hennie

    Such institutions depict the power relations prevailing at .... ministers responsible for foreign affairs, defence, public security and state security from each ...... 15 Force-to-force ratios measure how big an international force has to be to balance.

  15. Force Protection Common Operational Picture/Common Tactical Picture

    National Research Council Canada - National Science Library

    Peter, Russell

    1998-01-01

    ... has taken an integrated approach to Force Protection. There is a recognition that Force Protection is not a Security Police operation; but is a Security Force oDeration. This exemplifies a mindset change and a movement away from pure.

  16. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  17. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  18. Personnel ionizing radiation dosimeter

    International Nuclear Information System (INIS)

    Williams, R.A.

    1975-01-01

    A dosimeter and method for use by personnel working in an area of mixed ionizing radiation fields for measuring and/or determining the effective energy of x- and gamma radiation; beta, x-, and gamma radiation dose equivalent to the surface of the body; beta, x-, and gamma radiation dose equivalent at a depth in the body; the presence of slow neutron, fast neutron dose equivalent; and orientation of the person wearing the dosimeter to the source of radiation is disclosed. Optionally integrated into this device and method are improved means for determining neutron energy spectrum and absorbed dose from fission gamma and neutron radiation resulting from accidental criticality

  19. Personnel policy and management

    International Nuclear Information System (INIS)

    Dangelmaier, P.

    1986-01-01

    In the field of personnel policy and management two main points must be considered and fitted together: the aspects of the applicant and the aspects of the utility. The applicant wishes a position which suits to his abilities, education, training, experience and self-evaluation. The enterprise has beside these qualification criteria to look to some additional points: reliability - not only in the profession of the applicant but also in his daily life. In this examination licensing authorities are involved too; responsibility in a very broad sense and the ability to make correct decisions sometimes under stress situations. (orig.)

  20. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  1. 77 FR 11142 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-02-24

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0133] Merchant Marine Personnel... at the Hilton San Francisco Airport Bayfront Hotel, 600 Airport Blvd., Burlingame, CA 94010. For..., we are inviting public comment on the issues to be considered by the working group, which are listed...

  2. 77 FR 65570 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-10-29

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0968] Merchant Marine Personnel... hotel facilities or services for individuals with disabilities or to request special assistance, contact... comment on the issues to be considered by the work group, which are listed in the ``Agenda'' section below...

  3. TRIAGE of Irradiated Personnel

    Science.gov (United States)

    1996-09-25

    DISTRIBUTION/AVAILABILITY STATEMENT APUBLIC RELEASE , 13. SUPPLEMENTARY NOTES 14. ABSTRACT See Report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF...4510). Under draft STANAG 4511, multiple pro- phylactic antiemetic medications and regimens were evaluated prior to adoption of granisetron . Two drugs...exceeded the criteria (shown below), granisetron and ondansetron. The former was adopted due to a better technical profile and the operational

  4. A performance evaluation of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.; Wright, L.J.

    1987-01-01

    Personnel identity verification devices, which are based on the examination and assessment of a body feature or a unique repeatable personal action, are steadily improving. These biometric devices are becoming more practical with respect to accuracy, speed, user compatibility, reliability and cost, but more development is necessary to satisfy the varied and sometimes ill-defined future requirements of the security industry. In an attempt to maintain an awareness of the availability and the capabilities of identity verifiers for the DOE security community, Sandia Laboratories continues to comparatively evaluate the capabilities and improvements of developing devices. An evaluation of several recently available verifiers is discussed in this paper. Operating environments and procedures more typical of physical access control use can reveal performance substantially different from the basic laboratory tests

  5. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  6. Training of personnel

    International Nuclear Information System (INIS)

    1997-01-01

    Selected staffs (in the area of NPPs) are examined by the State Examining Committee established by Nuclear Regulatory Authority of the Slovak Republic (NRA SR's) chairman. The committee consists of representatives of NRA SR , Bohunice NPPs, Mochovce NPP, Research Institute of Nuclear Energy and experts from the Faculty of Electrical Engineering and Information Technology of the Slovak Technical University. The review of selected personnel of NPP V-1, V-2 and Mochovce NPP which passed exams in 1996 is given. NRA SR paid attention to the upgrading training process of individual categories of staff for V-1, V-2 and Mochovce NPPs, simulator training and training with computerized simulation system according to the United criteria of nuclear installation personnel training that started in 1992. During the year, an inspection was performed focused on examination of technical equipment of the simulator of Mochovce NPP, professional eligibility and overall preparation of simulator training including simulator software. Throughout the year launching works continued at the simulator with the deadline of commissioning to trial use operation in the first half of 1997

  7. Quo vadis, personnel monitoring

    International Nuclear Information System (INIS)

    Becker, K.

    1975-01-01

    With the increasing use of nuclear power and radiation sources, the selection of optimum systems for personnel monitoring is becoming a matter of worldwide concern. The present status of personnel dosimetry, sometimes characterized by unstable and inaccurate detectors and oversimplified interpretation of the results, leaves much to be desired. In particular, photographic film, although having certain advantages with regard to economics and information content, undergoes rapid changes in warm and humid climates. Careful sealing reduces, but does not prevent, these problems. The replacement of film by solid-state dosimeters, primarily thermoluminescence dosimeters, is in progress or being considered by an increasing number of institutions and requires a number of decisions concerning the choice of the optimum detector(s), badge design, and evaluation system; organizational matters, such as the desirability of automation and computerized bookkeeping; etc. The change also implies the potential use of such advanced concepts as different detectors and monitoring periods for the large number of low-risk persons and the small number of high-risk radiation workers. (auth)

  8. Personnel training and certification

    International Nuclear Information System (INIS)

    Whittemore, W.L.

    1976-01-01

    In order to make the full benefits of neutron radiography available in the nondestructive test (NDT) field, it has been necessary to formalize its application. A group under the Penetrating Radiation Committee of the American Society for Nondestructive Testing (ASNT) was organized to prepare a recommended practice for neutron radiography. The recommended practices require the establishment of an appropriate certification program. The requirements on the employer to establish and maintain a qualification and certification program are outlined. To conduct a program of nondestructive testing using neutron radiography requires the usual three levels of qualified and certified personnel. The program is administered by a Level III person. Routine exposure, reviews, and reporting of test results are the responsibilities of Level I and Level II personnal. The amount of training and nature of the required practical examination are also specified. The recommended practices document assures users that NDT work in the field of neutron radiography is performed by qualified personnel. Although no training courses are available to provide experience in the depth required by the recommended practices document, SNT-TC-1A, short courses are provided at a number of locations to familarize user's representatives with the interpretation of neutron radiographs and capabilities and limitations of the technique

  9. Evaluating the Effectiveness of Waterside Security Alternatives for Force Protection of Navy Ships and Installations Using X3D Graphics and Agent-Based Simulation

    National Research Council Canada - National Science Library

    Sullivan, Patrick J

    2006-01-01

    The individuals charged with the task of planning, developing and implementing force protection measures both at the unit and installation level must consider numerous factors in formulating the best defensive posture...

  10. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  11. 2014 Year End Report: Center for Development of Security Excellence

    Science.gov (United States)

    2014-01-01

    Personnel Security Adjudications In August 2014, LT Tetyana Muirhead, a U.S. Navy Nurse , earned her Certificates in Security Leadership and in...website or on the CDSE YouTube channel. Personnel can watch the webinars and download associated job aids and resources. CDSE OPEN ELEARNING COURSES

  12. The remote security station (RSS)

    International Nuclear Information System (INIS)

    Pletta, J.B.

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform

  13. Privacy Act System of Records: EPA Personnel Emergency Contact Files, EPA-44

    Science.gov (United States)

    Learn about the EPA Personnel Emergency Contact Files System, including including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedure.

  14. Personnel Selection Method Based on Personnel-Job Matching

    OpenAIRE

    Li Wang; Xilin Hou; Lili Zhang

    2013-01-01

    The existing personnel selection decisions in practice are based on the evaluation of job seeker's human capital, and it may be difficult to make personnel-job matching and make each party satisfy. Therefore, this paper puts forward a new personnel selection method by consideration of bilateral matching. Starting from the employment thoughts of ¡°satisfy¡±, the satisfaction evaluation indicator system of each party are constructed. The multi-objective optimization model is given according to ...

  15. Dental Health Status and Treatment Needs of Police Personnel of a ...

    African Journals Online (AJOL)

    Background: Oral health is an integral part of general health. Police personnel form the backbone for safety and security of a community hence their health is of utmost importance. Aim: The present study was conducted to assess the oral health status and treatment needs of police personnel employed in police stations of ...

  16. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  17. Zaštita računarskih mreža Ministarstva odbrane i Vojske Srbije primenom virtuelnog honeyneta / Security of computer network of the Ministry of Defence and the Serbian Armed Forces using virtual honeynets

    Directory of Open Access Journals (Sweden)

    Zoran Bobar

    2009-07-01

    Full Text Available U ovom radu obrađena je zaštita računarskih mreža u Ministarstvu odbrane i Vojsci Srbije primenom virtuelnog honeyneta. Zaštita je obrađena sa aspekta arhitekture računarskih mreža koje imaju pristup internetu. Predloženi koncept primene virtuelnog honeyneta uzima u obzir dostignuća nauke u ovoj oblasti u svetu, ostale primenjene metode i tehnike zaštite, mogućnosti i potrebe korisnika i elemente delova računarskog sistema Ministarstva odbrane i Vojske koji bi mogli biti meta napada sa udaljenih mesta globalne (internet mreže. / This paper covers the proposed solution for security of computer network in the Ministry of Defence and the Serbian Armed Forces using virtual honeynets. The security is covered from the aspect of the architecture of computer networks with Internet access. The proposed usage of virtual honeynets for protection takes into account the accomplishments of science in this field as well as security methods and techniques, users' needs and opportunities along with the computer network components of the MoD and the SAF that can be targets for attack.

  18. Strategic Studies Quarterly. An Air Force-Sponsored Strategic Forum on National and International Security. Winter 2009. Volume 3, Number 4

    Science.gov (United States)

    2009-01-01

    by George Shultz, William Perry, Henry Kissinger, and Sam Nunn. These seasoned policy experts shocked many with their advocacy of a “world free of...NY: Kennikat Press, 1956); Alexander George and Richard Smoke , Deterrence in American Foreign Policy: Theory and Practice (New York: Columbia...practiced abstinence in defense and security policy matters through the end of the 1990s—and why development of ESDP has proceeded only sluggishly since

  19. Surveillance of occupational exposure to ionizing radiation in the French air force: an example with a workplace study concerning the flight personnel on the E-3F; Surveillance de l'exposition professionnelle aux rayonnements ionisants dans l'armee de l'air. Exemple d'une etude de poste concernant les personnels navigants sur E-3F

    Energy Technology Data Exchange (ETDEWEB)

    Amabile, J.C.; Castagne, X.; Carbonnieres, H. de; Laroche, P. [Hopital des Armees du Val-de-Grace, 75 - Paris (France)

    2006-12-15

    This workplace study was first based on measurements of the ambient dose rates on board the E-3F (2000 to 2001). These results have been complemented by a series of measurements of individual exposure using passive and active gamma and neutrons dosimeters (2004 to 2005). We show that, from level 300 and after more than 200 flying hours per year, the air-crews of the French Air Force flying on board the E-3F are likely to annually receive an effective dose higher than 1 mSv. It is therefore necessary to organize a specific radiological and medical survey in favour of the air-crews of the E-3F and other aircraft with the same flight criteria. (authors)

  20. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    physical protection system is not covered by such studies, since this type of detection gives no information on either the effectiveness or the reliability of the MC and A systems. A critical scenario is defined as one which leads to discrepancies involving substantial amounts of NM or for which the detection delay is long. Special care is taken when analysing these scenarios. For critical scenarios, sensitivity analysis could be made to determine the smallest quantity of NM the disappearance of which could be detected or the criteria leading to the detection of the disappearance in the control system or in the accounting system. The threats taken into account are identified with reference to the design basis threat specified by the competent authority. Both internal and external threats are taken in account. Internal threats are defined as attempts by insiders to steal quantities of nuclear material, either once or on several occasions; accumulating these quantities leads to a significant quantity of NM. External threats are defined as attempts by groups of aggressors to steal significant amounts of nuclear material. Two hypotheses are taken into account to test the ability of the physical protection system to counter threats of this type. The first is based on a small group of aggressors with limited resources and the second involves a larger team with more sophisticated resources. Of course security studies have to be carried out in compliance with the corresponding confidentiality rules. In addition, such studies have to be regularly updated, notably if significant modifications are made in the MC and A or PP systems. It is important that security studies are available in the facilities for competent personnel, as it gives the rationale behind control and protection of NM. In particular, it could be used, in a performance-based approach, to support analysis reports or to illustrate that the required level of security has been reached. (author)

  1. 东北老工业区生态安全动态演变过程及驱动力%Dynamic evolution and driving forces of ecological security in the Traditional Industrial Area of northeastern China

    Institute of Scientific and Technical Information of China (English)

    唐呈瑞; 逯承鹏; 杨青; 姜璐; 任婉侠; 薛冰

    2017-01-01

    Ecological security is as important as national,economic,and financial security and has become the main constraint of future socio-economic security.The Traditional Industrial Area of northeastern China is an important traditional industrial and grain production base of China,and its ecological security is related to the implementation of sustainable development strategies.Based on the emergy-ecological footprint model,the ecological security in Traditional Industrial Area of northeastern China was quantitatively evaluated from 2000 to 2014,followed by a scenario analysis on the driving forces of the ecological security using a principal component analysis method.The results showed that,the value of emergy ecological-capacity per capita decreased from 0.66 to 0.64 hm2/cap,whereas the emergy-ecological footprint increased from 10.58 to 19.85 hm2/cap,which indicated that an ecological deficit existed in the Traditional Industrial Area of northeastern China.The ecological pressure in this area increased,showing an unsustainable development trend from 2000 to 2014.The ecological pressure index and ecological security levels gradually increasing,ecological security situation is deteriorating,ecological security issues to be urgent resolved.The ecological stress tended to be serious as a result of a combination of several factors,such as social,economic,population,resource,environmental,technological level,and land use degree.Finally,effective management strategies and suggestions to improve the ecological security of the Traditional Industrial Area of northeastern China were proposed.%生态安全与国防安全、经济安全、金融安全等已具有同等重要的战略地位,并成为未来经济社会安全的主要约束.东北老工业区作为我国重要的老工业基地及粮食生产基地,其生态安全状况关系着中国可持续发展战略的实施.采用能值-生态足迹模型,对东北老工业区2000-2014年生态安全动态演变过程进行

  2. An Operational Utility Assessment: Measuring the Effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)

    Science.gov (United States)

    2008-12-01

    time- on-task in deploying a patrol force, for example. In its most basic form, an FOB consists of a ring of barbed wire around a position with a...Modernizing The Marine Corps’ CH- 53 Super Stallion Helicopter,” Thesis, NPS (December 2001). HIGH LEVEL OF IMPORTANCE LOW 62 TASKS

  3. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  4. Personnel Officers: Judging Their Qualifications.

    Science.gov (United States)

    Webb, Gisela

    1988-01-01

    Discusses the backgrounds and qualifications appropriate for a library personnel administrator, including (1) a master's degree in library science; (2) library work experience; (3) additional training in administration, personnel management, organizational development, and psychology; and (4) personal attributes such as good communication skills,…

  5. Personnel Practices for Small Colleges.

    Science.gov (United States)

    Bouchard, Ronald A.

    Personnel administration in higher education is the focus of this "hands-on, how-to-do-it" guide that provides fundamental materials for developing and maintaining a sound personnel program. Part One (Employment) examines government regulations, employee recruitment and selection, pre-employment inquiries and screening, post-employment process,…

  6. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  7. Neutron personnel dosimetry

    International Nuclear Information System (INIS)

    Griffith, R.V.

    1982-01-01

    The measurement of neutron exposures to personnel is an issue that has received increased attention in the last few years. It is important to consider key aspects of the whole dosimetry system when developing dose estimates. This begins with selection of proper dosimeters and survey instruments, and extends through the calibration methods. One must match the spectral response and sensitivity of the dosimeter to the spectral characteristics of the neutron fields. Threshold detectors that are insensitive to large fractions of neutrons in the lower energy portion of reactor spectra should be avoided. Use of two or more detectors with responses that complement each other will improve measurement quality. It is important to understand the spectral response of survey instruments, so that spectra which result in significant overresponse do not lead to overestimation of dose. Calibration sources that do not match operational field spectra can contribute to highly erroneous results. In those situations, in-field calibration techniques should be employed. Although some detection developments have been made in recent years, a lot can be done with existing technology until fully satisfactory, long term solutions are obtained

  8. Personnel dosimetry in fluoroscopy

    International Nuclear Information System (INIS)

    Baechler, S.; Gardon, M.; Bochud, F.; Sans-Merce, M.; Verdun, F.R.; Trueb, Ph.

    2006-01-01

    Physicians who frequently perform fluoroscopic examinations are exposed to high intensity radiation fields and should use protective equipment such as lead aprons, thyroid shields and lead glasses. Standard individual dosimeters are worn under the lead apron in order to measure a dose that is representative of effective dose. However, large parts of the body are not protected by the apron (e.g. arms, head). Given a protection factor for the apron of about 100, an important irradiation of a body part not under the apron could go undetected. A study was conducted to analyse this situation by measuring dose using two dosimeters, one over-apron and one under-apron, for radiologists performing frequent fluoroscopic examinations. Measurements made over six-month period show that, indeed, the use of a single under-apron dosimeter is inadequate for personnel monitoring. Large doses to the head and arms are going undetected by this technique. A method for weighting the doses measured by under- and over-apron dosimeters to obtain a value better representative of the effective dose will be proposed. (authors)

  9. Special training of shift personnel

    International Nuclear Information System (INIS)

    Martin, H.D.

    1981-01-01

    The first step of on-the-job training is practical observation phase in an operating Nuclear Plant, where the participants are assigned to shift work. The simulator training for operating personnel, for key personnel and, to some extent, also for maintenance personnel and specialists give the practical feeling for Nuclear Power Plant behaviour during normal and abnormal conditions. During the commissioning phase of the own Nuclear Power Plant, which is the most important practical training, the participants are integrated into the commissioning staff and assisted during their process of practical learning by special instructors. The preparation for the licensing exams is vitally important for shift personnel and special courses are provided after the first non-nuclear trial operation of the plant. Personnel training also includes performance of programmes and material for retraining, training of instructors and assistance in building up special training programmes and material as well as training centers. (orig./RW)

  10. Dosimetry of the Occupational Exposure Personnel and not exposure of the INNSZ

    International Nuclear Information System (INIS)

    Ruiz J, A.

    1999-01-01

    In this work, was measured the equivalent dose of all the personnel of Nuclear medicine and personnel of the Institute which by its activities remain in the Department, by time determined, through thermoluminescent dosemeters and the results were that the personnel presents variable equivalent dose and it is proportional to the time and radionuclide type which use for their work. By this it is allowed to secure what the work watched with respect to radiological protection to fulfil with the International Standards standing for personnel in the Institute. (Author)

  11. Psychological help and psychoprophilaxis for the SRF personnel

    International Nuclear Information System (INIS)

    Kurochka, V.K.; Zhur, M.M.; Ratanov, Yu.Z.; Olejnik, S.I.

    1998-01-01

    Due to the growth of mental disorders in military personnel of strategic rocket forces the combined approach is considered to solving this problem connected with occupational exposure to ionizing radiation and electromagnetic radiation as well as to missile fuel. System for the psychoprophilactic measures and psychiatric help is discussed [ru

  12. Transforming the Albanian Armed Forces, Overcoming the Challenges

    National Research Council Canada - National Science Library

    Cahani, Nazmi

    2009-01-01

    The Albanian Armed Forces (AAF) are currently undergoing an extensive defense reform process that consists of transformation of its strategic concept, doctrine, organizational structure, personnel management system, military...

  13. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  14. Comparison of elective lumbar discectomy outcomes between civilians and military personnel

    International Nuclear Information System (INIS)

    Farzanegan, G.; Mohebbi, H.A.; Moharamzad, Y.

    2007-01-01

    To determine the results of discectomy surgery for lumbar disc herniation in military personnel and compare it with civilians. One-hundred and seventeen military patients (54 subjects as combat forces and 63 as office personnel) and 115 civilians, who underwent discectomy surgery were included. In a mean duration of 50.8 months, the ability to return to full duty and resolution of complaints were assessed and satisfaction was measured using a Visual Analog Scale. Inability to return to previous duty was significantly higher in military personnel compared to civilians (p = 0.002); and in combat forces compared to office personnel (p 0.05). Surgical intervention had relatively poor outcomes in military personnel, specifically in combat forces. Prevention of injury to back region should be considered in military training programs and in case of presence of disc herniation related symptoms, efforts should be made to save patients effective function by conservation and medical therapies. (author)

  15. Essence of the «Enterprise Management through Personnel Management» Paradigm

    OpenAIRE

    Vashchenko Natalia V.

    2013-01-01

    The article proves a necessity of consideration of personnel as a driving force of enterprise development. It studies and generalises the existing approaches of scientists to understanding the "enterprise management" and "personnel management" processes. It marks out problem and positive points of view of scientists with respect to identification of the role of personnel in the process of enterprise management and ensuring its development. It reveals the essence of the "management" and "enter...

  16. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  17. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  18. Personnel Risks in Ensuring Safety of Medical Activity

    Directory of Open Access Journals (Sweden)

    O. L. Zadvornaya

    2017-01-01

    Full Text Available Purpose: modern strategies of management of the organization require the formation of special management approaches based on the analysis of the mechanisms and processes of the organization of medical activities related to possible risks in activity of medical personnel. Based on international experience and own research the authors have identified features of a system of management of personnel risk in medical activities, examined approaches showing the sequence and contents of the main practical activities of the formation, maintenance and development of the system of management of personnel risks. Emphasized is the need for further research and implementation of the system of management of personnel risk in health care organizations. Study and assessment of personnel risks affecting the security of medical activities aimed at the development of the system of personnel risk management, development of a system of identification and monitoring of HR risk indicators with a purpose to improve institutional management and increase efficiency of activity of medical organizations. Methods: in the present study, the following methods were used: systemic approach, content analysis, methods of social diagnosis (questionnaires, interviews, comparative analysis, method of expert evaluations, method of statistical processing of information. Results: approaches to predict the occurrence and development of personnel risks have been reviewed and proposed. Conclusions and Relevance: patient safety is a global issue affecting countries at all levels of development. Each year, the WHO identifies a number of systemic and technical aspects and trends in the field of patient safety related to actions of medical workers. Existing imbalances in the staffing of the health system of the Russian Federation increase the probability of potential risks in medical practice. The personnel policy of healthcare of the Russian Federation requires further improvement and

  19. Understrength Air Force Officer Career Fields. A Force Management Approach

    Science.gov (United States)

    2005-01-01

    LtCol John Crown (DPSA). In addition, we had very helpful interviews with Mr. Vaughan Blackstone (DPAPP) and Mr. Dennis Miller (DPPAO). Also at...problems in managing personnel assignments. First, there is a high " tax " for special-duty jobs that requires them to place personnel officers into...targeted year-groups populated above the ideal force- structure line (called TOPLINE), in the run up to the RIF of 1992, the desire to avoid or

  20. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  1. Impact of Population Aging on Military and Security Policy

    Directory of Open Access Journals (Sweden)

    Martina Šimková

    2014-12-01

    Full Text Available Population ageing is among the most important problems of developed European countries and the most frequently discussed social issues. The Czech Republic also faces population ageing and we cannot expect a different trend in the future. Life expectancy has increased due to better health care while current lifestyle often leads to lower natality, resulting in a negative rate of natural increase and a decreasing proportion of young people in population in the future. This problem affects all spheres of life and social and economic development. Population ageing may pose a threat to the security of the population in different ways. The functioning of the security system may be threatened due to decreasing workforce. Population ageing may undercut resources for military budgets. Young recruits represent an important part of military forces and the latter are competing in the labour market with more attractive occupations. Especially ensuring the stability of the personnel needed for securing crisis situations would be a significant problem of near future. This paper presents a demographic perspective on staffing and correct operation of military forces in the context of population ageing. It describes the current situation of human resources in the military policy of the Czech Republic and determines the negative impact of population ageing on recruitment potential. It deals with the sustainability of human resources for security forces.

  2. Forced Dependency and Legal Barriers: Implications of the UK’s Immigration and Social Security Policies for Minoritized Women Living in Abusive Intimate Relationships in Northern Ireland

    Directory of Open Access Journals (Sweden)

    Monica McWilliams

    2015-12-01

    Full Text Available This paper examines the complexities of the help-seeking process of minoritized women (primarily asylum-seekers and immigrants experiencing domestic violence in Northern Ireland. The term ‘minoritized’ is used here to emphasize that “minority” status is not a static or innate trait of certain groups but instead is the outcome of a process of being positioned as a minority. The paper addresses the intersections of ethnicity, nationality, class and gender and shows how state policies in relation to immigration and social security reinforce inequalities in gendered power relations. Despite attempts to improve the social security and immigration systems, the findings from a Northern Ireland study show how recent policy changes have not addressed the systemic institutional racism and institutionalised patriarchy in these agencies. Where avenues for action are undermined by such practices, the policies raise concerns about the safety and protection of minoritized women living in abusive relationships. We argue that the UK is failing to meet its human rights responsibilities to provide adequate support and assistance to minoritized women in abusive relationships and conclude that delivering state accountability alongside a human rights framework based on security, autonomy, liberty and equality is what is needed. Este artículo analiza las complejidades del proceso de búsqueda de ayuda en Irlanda del Norte para mujeres pertenecientes a minorías (principalmente solicitantes de asilo e inmigrantes que sufren violencia doméstica. El término 'minoritarizadas' se utiliza aquí para hacer hincapié en que la situación de "minoría" no es un rasgo estático o innato de ciertos grupos, sino que es el resultado de un proceso de ser posicionado como una minoría. El artículo aborda las intersecciones de origen étnico, nacionalidad, clase y género y muestra cómo las políticas estatales en relación a la inmigración y la seguridad social

  3. Cyberculture and Personnel Security: Report 1 - Orientation, Concerns, and Needs

    Science.gov (United States)

    2011-05-01

    criteria for Internet addiction. Cyber Psychology and Behavior, 4, 377-383. Bender, B. (2010). Pentagon workers tied to child porn . Retrieved July 30...C. (2007). Virtual child porn riles law enforcement. Retrieved July 29, 2010, from http://abcnews.go.com/TheLaw/story?id=3159871 Frontline. (2009...blackmail girl for porn . PC World. Retrieved February 4, 2011, from http://www.pcworld.com/article/218582/Man_Used_Facebook_to_Try_to_Bl

  4. Ensuring Successful Personnel Management in the Department of Homeland Security

    Science.gov (United States)

    2002-01-01

    of Public- Private Sector Wages Allowing for Endogenous Choices of Both Government and Union Status,” Journal of Labor Economics , Vol. 6, 1988...Differential in the United States,” Journal of Labor Economics , Vol. 8, No. 2, 1990. Rosenthal, Douglas, Margaret Barton, Douglas Reynolds, and Beverly Dugan

  5. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... section of the economy; productivity; competition; jobs; the environment; public health or safety; or..., religion, sex, national origin, disability, or sexual orientation, and no inference may be raised solely on the basis of an individual's sexual orientation. (f) Discretionary judgments that determine...

  6. Some problems of NPP personnel training

    International Nuclear Information System (INIS)

    Vajshnis, P.P.; Kumkov, L.P.; Omel'chuk, V.V.

    1984-01-01

    Shortcomings of NPP personnel training are discussed. Development of full-scale training systems is necessary for qualitative training operative personnel. Primary problems that should be necessarily solved for ensuring effective training NPP personnel are considered

  7. Energy Requirements of Military Personnel

    National Research Council Canada - National Science Library

    Tharion, William J; Lieberman, Harris R; Montain, Scott J; Young, Andrew J; Baker-Fulco, Carol J

    2005-01-01

    ...) have been measured while training under various conditions. Group mean total energy expenditures for 424 male military personnel from various units engaged in diverse missions ranged from 13.0 to 29.8 MJ per day...

  8. Individual protection of NPP personnel

    International Nuclear Information System (INIS)

    Koshcheev, V.S.; Gol'dshtejn, D.S.; Chetverikova, Z.S.

    1983-01-01

    Specific features of NPP personnel individual protection are considered, mainly with respect to maintenance and repair works on various type reactors. The major concern is given to the selection and application reglamentations of the individual protection system (IPS), employment of sanitary locks, the organization of individual protection under the conditions of a heating microclimate. The ways are specified to the development and introduction of the most effective IPS and improvement of the entire NPP personnel individual protection system with respect to providing the necessary protection effect for maintaining high working capability of the personnel and minimizing the IPS impact on human organism functional systems. The accumulated experience in the personnel individual protection can be applied during construction and operation of NPP's in CMEA member-countries [ru

  9. Personnel monitoring in geologic fields

    International Nuclear Information System (INIS)

    Romanova, I.N.; Seredin, Yu.V.

    1981-01-01

    State of radiation safety for the personnel of geologic crews carrying out neutron logging of wells using Po-Be sources has been evaluated. Given are results of development of methods for the evaluation of individual radiation loads for personnel when working with Po-Be neutron sources useful for the application in practice by a geologic logging crew as well as a quantitative evaluation of profissional radiation loads during this kind of work. The following methods are recommended for personnel monitoring: 1) calculation of whole-body irradiation doses and hands from averaged values of radiation dose rate; 2) calculational tabulated determination of irradiation doses during recharging of shanks of well instruments. Personnel monitoring by means of instrumental methods is not necessary in the considered case [ru

  10. Estimated Cost of the Administration's Proposal to Increase the Army's and the Marine Corps's Personnel Levels

    National Research Council Canada - National Science Library

    Schmit, Matt; Wheelock, Jason; Newman, David

    2007-01-01

    .... The Administration also plans to increase the size of the Army Reserve and National Guard. The cost of the Administration's proposal to increase the size of the armed forces depends on the personnel levels it is being measured against...

  11. Beyond Race and Gender: Motivating Enlisted Personnel to Remain in Today's Military

    National Research Council Canada - National Science Library

    Moore, Brenda

    2001-01-01

    .... Data from the Armed Forces 1996 Equal Opportunity Survey reveal that both the pay and benefits and pride in service variables have stronger effects on the propensity of junior-enlisted personnel...

  12. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  13. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  14. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  15. Information report on the behalf of the foreign affairs, defence and armed forces Commission on France security, nuclear disarmament and non proliferation

    International Nuclear Information System (INIS)

    2010-01-01

    This report first gives an overview of nuclear disarmament and non proliferation twenty years after the end of Cold War: evolution and status of Russia's and United States' nuclear weapon arsenals, France's and United Kingdom's trend to reduce their nuclear armament, reinforcement of China's nuclear armament, effects and limitations of the Non Proliferation Treaty (NPT). It notices that the new international context gave birth to some expectations and may lead to a lower nuclear pressure, notably with the influence of START negotiations between Russia and the United States, provided that the Comprehensive Nuclear Test Ban Treaty is ratified by more countries, and that negotiations promote a Fissile Material Cut-off Treaty. The report also outlines the importance of the promotion of better controlled peaceful uses of nuclear energy. It discusses the relationship between maintaining the world nuclear order and the reduction of international and regional tensions, and the importance of struggle against all forms of proliferation. It analyses the French nuclear posture in terms of security requirements, and in front of the zero nuclear option, in a context of ballistic missile proliferation, and in relationship with the issue of tactical nuclear weapons in Europe

  16. Personnel external dose monitoring system

    International Nuclear Information System (INIS)

    Zhao Hengyuan

    1989-01-01

    The status and trend of personnel external dose monitoring system are introduced briefly. Their characteristics, functions and TLD bedges of some commercially available automatic TLD system, including UD-710A (Matsushita, Japan), Harshaw-2271, 2276 (Harshaw, USA), Harshaw-8000 (Harshaw/Filtrol), Studsvik-1313 (Sweden) and Pitman-800 (UK) were depicted in detail. Finally, personnel dose management and record keeping system were presented and two examples were given

  17. THEORETICAL BASIS FOR MANAGEMENT OF PERSONNEL RISKS

    OpenAIRE

    Haliashova, Katsiaryna

    2017-01-01

    Necessity of personnel risks management is based on research results. The authors' approaches to the determination of personnel risks and to their management have been explored. The author's definition of the concept of "personnel risks" is proposed. A classification of personnel risks is developed depending on the stage of origin and the tasks of the personnel policy, as well as the methods of management personnel risks in the organization. The article presents a methodical approach to perso...

  18. Security analysis of optical encryption

    OpenAIRE

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-01-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  19. Security analysis of optical encryption

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-10-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  20. Communications and Information: Emission Security

    National Research Council Canada - National Science Library

    1998-01-01

    The Air Force EMSEC process has experienced many changes. Although these changes were attempts to meet the variances of a dynamic world, they require security protection measures far beyond the needs of the average user...

  1. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  2. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  3. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  4. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  5. Health Status of Military Women in the Total Force

    National Research Council Canada - National Science Library

    Bray, Robert

    1997-01-01

    ..., Air Force, and Guard/Reserve components. These data will be combined with comparable data from a Naval Health Research Center survey of active-duty Navy and Marine Corps personnel to form a comprehensive dataset for the Total Force...

  6. The WINS Academy Security Certification Programme: The Route to Demonstrable Competence

    International Nuclear Information System (INIS)

    Howsley, Roger

    2014-01-01

    Key Messages: The Nuclear Sector is a long way behind other sectors in certifying personnel with security accountabilities as being competent; We need to do something about it urgently; Attending security awareness courses is simply not enough

  7. Administrative Circular No. 11 (Rev. 4) - Categories of members of the personnel

    CERN Multimedia

    HR Department

    2016-01-01

    Administrative Circular No. 11 (Rev. 4) entitled "Categories of members of the personnel", approved by the Director-General following discussion in the Standing Concertation Committee meeting on 29 April 2016, will be available on 1 August 2016 via this following link.    This revised circular cancels and replaces the Administrative Circular No. 11 (Rev. 3) also entitled "Categories of members of the personnel" of September 2014. The main changes concern the status of apprentices and their transfer from the category of employed members of personnel to associated members of personnel. This circular will enter into force on 1 August 2016. Department Head Office

  8. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  9. Modelling Career Intent of Specific Air Force Personnel Categories

    Science.gov (United States)

    1982-09-01

    Contributions are payments the participant makes to the organization in the form of work. It is postu- lated that as the balance of inducements...contributions is believed to have the opposite effect. The inducement-contribution balance is a function of two major components: perceived ease of movement...set of issues, preliminary efforts centered around the development of a theoretically based quality of worklife model which would provide a logical

  10. Use of Alternative Therapies by Active Duty Air Force Personnel

    Science.gov (United States)

    1996-05-13

    Involves massaging pressure points on the foot or hand. Reflexology practitioners believe that each organ and gland in the body has a corresponding reflex...includes beliefs about sickness, decisions about how to respond to episodes of illness, and expectations and evaluations of a particular kind of care...the perspective of social and cultural settings for it includes people’s beliefs and patterns of behavior. Kleinman emphasizes health care systems

  11. Effects of Shiftwork on Air Force Aircraft Maintenance Personnel

    National Research Council Canada - National Science Library

    Campbell, Craig

    1998-01-01

    .... Health and well being, on- and off-duty accident rates, day shift vs. night shift accident rates, and the effects of stress and fatigue on specific satisfactions, job dissatisfaction, and reenlistment intentions were examined...

  12. Risk and Resilience in Deployed Air Force Medical Personnel Study

    Science.gov (United States)

    2011-09-15

    e.g., Linley, Andrews, & Joseph, 2007; Morris, Shakespeare - Finch, Rieck, & Newbery, 2005; Taku, Cann, Calhoun, & Tede- schi, 2008). These factors...providers. Military Psychology, 16, 99–114. doi:10.1207/ S15327876MP1602_2 Morris, B. A., Shakespeare -Finch, J., Rieck, M., & Newbery, J. (2005

  13. Multivariate Modelling of the Career Intent of Air Force Personnel.

    Science.gov (United States)

    1980-09-01

    index (HOPP) was used as a measure of current job satisfaction . As with the Vroom and Fishbein/Graen models, two separate validations were accom...34 Organizational Behavior and Human Performance , 23: 251-267, 1979. Lewis, Logan M. "Expectancy Theory as a Predictive Model of Career Intent, Job Satisfaction ...W. Albright. "Expectancy Theory Predictions of the Satisfaction , Effort, Performance , and Retention of Naval Aviation Officers," Organizational

  14. Neural Networks and Their Application to Air Force Personnel Modeling

    Science.gov (United States)

    1991-11-01

    researchers have also made similar suggestions (Darken & Moody, 1990; DeSieno, 1988; Kangas, Kohonen, Leaksones, Simula, & Venta , 1989). LVQ is also...failure time data. New York: John Wiley & Sons. . Kangr’s, J., Kohonen, T., Leaksones, J., Simula, 0., & Venta , 0. (1989). Variants of self-organizing

  15. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  16. Cytogenic Investigations in Flight Personnel

    International Nuclear Information System (INIS)

    Wolf, G.; Obe, G.; Bergau, L.

    1999-01-01

    During long-distance flights at high altitudes flight personnel are exposed to cosmic radiation. In order to determine whether there are biological effects of such low dose radiation exposure in aircrew, chromosomal aberrations were investigated in 59 female cabin attendants and a matched control group of 31 members of station personnel. The mean number of dicentric chromosomes amounts to 1.3 (95% CI 1.0-1.6) per 1,000 cells in cabin attendants and 1.4 (95% CI 1.0-1.9) per 1,000 cells in controls. In an additional control group of 56 female clerks from Berlin the mean frequency of dicentric chromosomes was 1.3 (95% CI 1.0-1.6). Neither in dicentric frequency and distribution nor in other aberrations was a significant difference between the groups of flight and station personnel found. The high frequency of multi-aberrant cells was remarkable in flight personnel as well as in station personnel. The reason for this phenomenon is unknown and needs further investigation. (author)

  17. Radiological protection of service and civilian personnel

    International Nuclear Information System (INIS)

    1990-01-01

    Since the United Kingdom's defence nuclear industry was founded in the late 1940s, Service and civilian personnel have been exposed to ionising radiation. During the last forty years, as knowledge about the effects of radiation exposure has grown, concern to ensure adequate protection against exposure has also increased,. As part of our continuing scrutiny of the Ministry of Defence (MoD), we have undertaken a short inquiry to examine MoD's current and future policy and practice on radiological protection. The principal work involving exposure of Service and civilian personnel to significant levels of radiation falls into two discrete areas: the nuclear weapons programme and the nuclear propulsion programme. The nuclear weapons programme involves research, the production of nuclear warheads and their deployment with Her Majesty's Forces. The nuclear propulsion programme involves research, production, operation, refitting and decommissioning of pressurised water reactors as a source of propulsion power in Royal Navy submarines. These two nuclear programmes are not the only sources of ionising radiation within MoD's responsibility: it also arises from research, non-destructive testing and medical applications, most notably conventional radiography. In this Report we have concentrated upon ionising radiation arising from the two defence nuclear programmes. (author)

  18. International Affairs Programs: The Air Force Versus the Army

    Science.gov (United States)

    2015-10-01

    individual tutoring programs . Additionally RAS personnel are offered regional enhancement studies opportunities at several facilities.48 RAS personnel...AU/ACSC/2015 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY INTERNATIONAL AFFAIRS PROGRAMS : THE AIR FORCE VERSUS THE ARMY by Robin L...5 COMPARISON: INTERNATIONAL AFFAIRS PROGRAMS AIR FORCE VERSUS ARMY 8

  19. Packing force data correlations

    International Nuclear Information System (INIS)

    Heiman, S.M.

    1994-01-01

    One of the issues facing valve maintenance personnel today deals with an appropriate methodology for installing and setting valve packing that will minimize leak rates, yet ensure functionality of the the valve under all anticipated operating conditions. Several variables can affect a valve packing's ability to seal, such as packing bolt torque, stem finish, and lubrication. Stem frictional force can be an excellent overall indicator of some of the underlying conditions that affect the sealing characteristics of the packing and the best parameter to use when adjusting the packing. This paper addresses stem friction forces, analytically derives the equations related to these forces, presents a methodology for measuring these forces on valve stems, and attempts to correlate the data directly to the underlying variables

  20. Training of research reactor personnel

    International Nuclear Information System (INIS)

    Cherruau, F.

    1980-01-01

    Research reactor personnel operate the reactor and carry out the experiments. These two types of work entail different activities, and therefore different skills and competence, the number of relevant staff being basically a function of the size, complexity and versatility of the reactor. Training problems are often reactor-specific, but the present paper considers them from three different viewpoints: the training or retraining of new staff or of personnel already employed at an existing facility, and training of personnel responsible for the start-up and operation of a new reactor, according to whether local infrastructure and experience already exist or whether they have to be built up from scratch. On-the-spot experience seems to be an essential basis for sound training, but requires teaching abilities and aids often difficult to bring together, and the availability of instructors that does not always fit in smoothly with current operational and experimental tasks. (author)

  1. Simulation of a force on force exercise

    International Nuclear Information System (INIS)

    Terhune, R.; Van Slyke, D.; Sheppard, T.; Brandrup, M.

    1988-01-01

    The Security Exercise Evaluation System (SEES) is under development for use in planning Force on Force exercises and as an aid in post-exercise evaluation. This study is part of the development cycle where the simulation results are compared to field data to provide guidance for further development of the model. SEES is an event-driven stochastic computer program simulating individual movement and combat within an urban terrain environment. The simulator models the physics of movement, line of sight, and weapon effects. It relies on the controllers to provide all knowledge of security tactics, which are entered by the controllers during the simulation using interactive color graphic workstations. They are able to develop, modify and implement plans promptly as the simulator maintains real time. This paper reports on how SEES will be used to develop an intrusion plan, test the security response tactics and develop observer logistics. A Force on Force field exercise will then be executed to follow the plan with observations recorded. An analysis is made by first comparing the plan and events of the simulation with the field exercise, modifying the simulation plan to match the actual field exercise, and then running the simulation to develop a distribution of possible outcomes

  2. Eleventh DOE workshop on personnel neutron dosimetry

    International Nuclear Information System (INIS)

    1991-01-01

    Since its formation, the Office of Health (EH-40) has stressed the importance of the exchange of information related to and improvements in neutron dosimetry. This Workshop was the eleventh in the series sponsored by the Department of Energy (DOE). It provided a forum for operational personnel at DOE facilities to discuss current issues related to neutron dosimetry and for leading investigators in the field to discuss promising approaches for future research. A total of 26 papers were presented including the keynote address by Dr. Warren K. Sinclair, who spoke on, ''The 1990 Recommendations of the ICRP and their Biological Background.'' The first several papers discussed difficulties in measuring neutrons of different energies and ways of compensating or deriving correction factors at individual facilities. Presentations were also given by the US Navy and Air Force. Current research in neutron dosimeter development was the subject of the largest number of papers. These included a number on the development of neutron spectrometers

  3. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  4. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  5. Personnel Management theories and applications

    Institute of Scientific and Technical Information of China (English)

    Yanni Feng

    2010-01-01

    @@ 1.Introduction Many new businesses are opened in the whole world every day.Unfortunately,only a minor part of them has success and continues its activity.There is a variety of reasons which determine the hankruptcy of companies.Most of them are included in running a business,and more and more people come to realize the significance of management,especially personnel management,as personnel represents the relationship between people in the company,which is a key point for the development of enterprise.

  6. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  7. Supporting the Future Total Force: A Methodology for Evaluating Potential Air National Guard Mission Assignments

    National Research Council Canada - National Science Library

    Lynch, Kristin F; Drew, John G; Sleeper, Sally; Williams, William A; Masters, James M; Luangkesorn, Louis; Tripp, Robert S; Lichter, Dahlia S; Roll, Charles R

    2007-01-01

    Manpower end-strength reductions of active duty personnel in the U.S. Air Force are making it more difficult to support the air and space expeditionary force construct using current force employment practices...

  8. Ethnic Minority Personnel Careers: Hindrances and Hopes

    OpenAIRE

    Ross, Catharine

    2004-01-01

    Personnel departments often have particular responsibility for equal opportunities within their organizations. This paper explores equal opportunities within personnel departments themselves, in relation to the careers of ethnic minority personnel practitioners. Through primary research, it identifies a range of criteria which can affect personnel careers, of which ethnic origin is often one. However, although being categorized as of ethnic minority origin often hinders personnel careers, the...

  9. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  10. Overview of allied health personnel shortages.

    Science.gov (United States)

    Elwood, T W

    1991-01-01

    Upon learning that 95% of all fatal traffic accidents occur within three miles of one's home, an acquaintance moved to another residence four miles away and is still alive today. The world might be a much better place if most obstacles could be overcome this handily. Unfortunately, the problem of allied health personnel shortages appears to be more intractable. Because the situation is complicated in nature, it is most unlikely that any single remedy will suffice. Public and private interests have joined forces in many states, but it is abundantly clear that conventional market forces are unlikely to prevail. These forces usually focus on supply and demand. While shortages may cause entry-level salaries to rise, they do not stimulate academic institutions to increase their output nor will they affect the availability of research funding and/or doctoral training programs. Current market forces compel health facilities to engage in bidding wars for scarce manpower. Although individual job seekers may benefit, this practice does not increase the number of training program graduates. The federal government has a decisive role to play in assuring an adequate number of personnel to meet this nation's health care needs. Assistance is necessary in the form of providing entry- and advanced-level traineeships to accelerate the flow of part-time students pursuing doctorates, and to fund model student recruitment/retention projects. This role should encompass attracting students (particularly from minority and underserved portions of the population) to academic programs. The Disadvantaged Minority Health Improvement Act, PL 101-527 that was enacted in November 1990, contains only minimal provisions for allied health. Eligibility for student scholarship assistance is restricted to a small handful of allied health professions. Moreover, allied health is not eligible for the loan repayment program aimed at individuals who agree to serve on the faculty of health professions

  11. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  12. development of an integrated campus security alerting system

    African Journals Online (AJOL)

    user

    Keywords: Campus Security, Microcontroller, Internet Protocol Camera, Integrated system, Micro-switches. 1. INTRODUCTION .... personnel can fall back to the information captured/stored ...... Adetoba A. O. "Design and Construction of a Car.

  13. Zero based programming: a viable security budgeting approach.

    Science.gov (United States)

    Roll, Frederick G

    2003-01-01

    To get additional dollars or avoid budget cuts or personnel reductions, healthcare security directors should consider a budget approach that best justifies the needs of the department or organization.

  14. 32 CFR 552.109 - Routine security controls.

    Science.gov (United States)

    2010-07-01

    ..., dependent, or DoD civilian identification cards are authorized unimpeded access to Fort Lewis during periods... who desire to visit unit areas, club facilities and other recreational facilities, security personnel...

  15. ILO Policy Guidelines on the promotion of decent work for early childhood education personnel

    OpenAIRE

    ILO International Labour Office

    2014-01-01

    These Guidelines set out principles for the promotion of decent work for early childhood education (ECE) personnel as a means of ensuring universal access to high-quality ECE services. In this respect they cover conditions of work and employment of ECE personnel and related issues, including ECE financing, curricula and learning practices, social security, professional ethics and ECE governance systems. The Guidelines are meant to serve as a reference tool on principles that should be reflect...

  16. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  17. Security in the nuclear medicine department

    International Nuclear Information System (INIS)

    Bassingham, S.; Gane, J.; Chan, P.S.; Heenan, S.; Gulliver, N.; McVey, J.

    2005-01-01

    The current threat from terrorism highlights the need for awareness of adequate security of radioactive sources by health bodies to prevent the opportunistic access to, theft of. or accidental loss of sources, together with stringent security measures in place to prevent the international misuse of radioactive sources as a weapon by unauthorised access. This presentation discusses the processes undertaken to ensure the safety and security of radioactive materials within the nuclear medicine department in line with current regulations and guidelines. These include risk assessments, security systems, audit trails, restricted access and personnel background checks

  18. Study of personnel monitoring programs

    International Nuclear Information System (INIS)

    Guerra, Aline B.; Lorenzini, Fabiane; Carlos, Janaina; Bernasiuk, Maria E.B.; Rizzatti, Mara R.; Fuentefria, Jose L.B.

    1996-01-01

    Surveillance of several health institutions who use ionizing radiation sources, as well as data from the state of Rio Grande do Sul (Brazil) are studied concerning the use of personnel dosimeters. The results show that several institutions do not provide them and those which provide do not know how to use them

  19. Rights & Responsibilities. Personnel Management Module.

    Science.gov (United States)

    Barker, Gale; And Others

    This module on rights and responsibilities is intended to introduce the hospitality manager or supervisor to sound personnel management practices that comply with the law. The material is presented in a self-instructional format in seven sections. At the beginning of each section is a statement of the objectives that will be achieved as a result…

  20. Personnel monitoring for beta rays

    International Nuclear Information System (INIS)

    Piesch, E.; Johns, T.F.

    1983-01-01

    The practical considerations which have to be taken into account in the design of personnel monitors intended to measure doses resulting from exposure to beta rays are discussed. These include the measurement of doses in situations involving either fairly uniform or non-uniform irradiation and of doses to the male gonads. (UK)

  1. Project Management Personnel Competencies Evaluation

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2006-01-01

    Full Text Available An important factor for the success management of IT projects is the human resource. People involved in the project management process have to be evaluated. In order to do that, same criteria has to be specified. This paper describes some aspects regarding the personnel evaluation.

  2. 78 FR 37244 - Submission for Review: We Need Important Information About Your Eligibility for Social Security...

    Science.gov (United States)

    2013-06-20

    ... Important Information About Your Eligibility for Social Security Disability Benefits, RI 98-7. As required... Personnel Management. Title: We Need Important Information About Your Eligibility for Social Security... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need Important Information About Your...

  3. Safeguards through secure automated fabrication

    International Nuclear Information System (INIS)

    DeMerschman, A.W.; Carlson, R.L.

    1982-01-01

    Westinghouse Hanford Company, a prime contractor for the U.S. Department of Energy, is constructing the Secure Automated Fabrication (SAF) line for fabrication of mixed oxide breeder fuel pins. Fuel processing by automation, which provides a separation of personnel from fuel handling, will provide a means whereby advanced safeguards concepts will be introduced. Remote operations and the inter-tie between the process computer and the safeguards computer are discussed

  4. Study on Maintenance Personnel Development Plan For The Exported APR1400 Commissioning

    International Nuclear Information System (INIS)

    Cho, Sungbae; Kim, Jongdae; Jun, Hokwang; Hwang, Inok; Kang, Jaeyuel

    2012-01-01

    This paper indicates ways to develop maintenance personnel for the exported APR1400 commissioning. The exported APR1400 has not been experienced ay maintenance yet, and requirements for maintenance personnel have not been clarified yet. Based on sound maintenance experience, KEPCO Plant Service and Engineering Company (KEPCO KPS) has studied on maintenance training and career requirement to establish a development plan of the maintenance personnel for the exported nuclear power plant. By defining manpower and training requirement, and mobilization plan, we expect to secure reliability of the exported APR1400

  5. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  6. Nuclear security at the summer 2004 Olympic Games

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: The International Atomic Energy Agency (IAEA) today announced an unprecedented joint action plan to help ensure a high level of nuclear security at the 2004 Olympic Games. Cooperation between the IAEA, the Greek Atomic Energy Commission and the Greek Olympics Games Security Division to provide expert advice and technical assistance followed a request for assistance from the two Greek authorities to the IAEA last summer. The action plan is designed to protect facilities and materials, to detect illicit trafficking and malicious use of radioactive materials, and to ensure that emergency response forces are effective and efficient. Much of the work in Greece has been undertaken in co-operation with some IAEA Member States - with substantial support provided by the United States and France in the fields of equipment, training and technical advice. The physical protection of the Demokritos nuclear research reactor, in a suburb of Athens, has been upgraded and the security of radioactive sources used at medical and industrial facilities in six Greek cities has been tightened. Radiation detection equipment has been installed at borders and other entry points into Greece, and mobile detection equipment will be deployed elsewhere. Hand-held radiation monitors are being distributed amongst the thousands of security personnel and customs officials who are involved in the security for the Games. The equipment is being deployed to detect radioactive materials that might be used as a weapon by terrorists in a radiological dispersal device, a so-called 'dirty bomb'. Detailed information on the steps that have been taken cannot be disclosed for reasons of security. 'There has been good cooperation with the Greek Atomic Energy Commission and with the other international partners in developing and implementing this work' said Mohamed ElBaradei, Director General of the IAEA. 'We are collectively striving for a high measure of security and the work being undertaken should

  7. 5 CFR 359.602 - Agency reductions in force.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Agency reductions in force. 359.602... Appointees as a Result of Reduction in Force § 359.602 Agency reductions in force. (a) Competitive procedures... removed from the SES in any reduction in force of career appointees within the agency. Such competitive...

  8. Advanced Interface for Tactical Security (AITS) Problem Analysis and Concept Definition

    National Research Council Canada - National Science Library

    Murray, S

    1999-01-01

    The Advanced Interface for Tactical Security (AITS) project was initiated to improve the task performance of security forces through technology and design improvements to information display systems...

  9. Shift work in a security environment

    International Nuclear Information System (INIS)

    Longhouser, G.A. Jr.

    1993-01-01

    Human beings are diurnal species, normally active by day and asleep by night. Yet over thirty million Americans struggle with work schedules that include an off-normal work effort. The railroads, law enforcement, health services, Department of Defense, factory workers, chemical plants and public services, communications and utility workers must provide some form of around-the-clock effort. Shift work has been around since the advent of recorded history. There has always been a need for some type of off-normal service and assistance. The impact of shift work is replete with tales and factual evidence of an increased personnel error rate; disorders, both personal and family, and of course, increased accident events. In recent memory, the Three Mile Island Nuclear Plant incident, Union Carbide's explosion in Bhopal, and the Chernobyl Nuclear Plant catastrophe all occurred during off-normal working hours. Yet management overall has done little to correct the production-driven twelve hour, seven day week shift mentality of the nineteenth century. Most schedules in use today are nothing more than cosmetic variations of the old production schedules. This could be driven by a management consideration of the worker's response to change coupled with a reluctant buy-in of responsibility for the effects of change. Florida Power Corporation has developed for its nuclear security force, a unique work schedule which attempts to employ the sound principles of circadian rhythms coupled with a comprehensive training program to counter the problems associated with shift work. The results over the last four years have seen a marked reduction in the generic problems of personnel errors, absenteeism, unscheduled overtime and turnover rates. Utilization and understanding of this scheduling process for rotational shift work needs to be assessed to determine if the benefits are site specific or provide an expected response to the problems of shift work

  10. Biometrics in support of special forces medical operations.

    Science.gov (United States)

    Kershner, Michael R

    2012-01-01

    Recommendations on ways in which the ODA can leverage biometrics in medical operations to improve their security, improve relations with indigenous personnel, and contribute to the larger theater biometrics program. 2012.

  11. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  12. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  13. Developing Sustainable Afghan National Security Forces

    Science.gov (United States)

    2012-06-08

    codifies approved methods and techniques throughout an organization. “Doctrine is accepted corporate knowledge; it is authoritative . By definition...doctrine provides authoritative guidance on how the organization ought to operate with current capabilities. It therefore provides the basis for...nutrition; and infant, child, and maternal mortality. . . . Furthermore, Afghanistan’s prospects for growth are severely limited by weak economic

  14. Forced displacement and women's security in Colombia.

    Science.gov (United States)

    Meertens, Donny

    2010-04-01

    In the protracted Colombian conflict, assistance to internally displaced persons has developed in the context of contradictory political processes. The Colombian government's launching of a transitional justice process in the midst of armed conflict has generated a complex situation displaying both conflict and post-conflict characteristics. The progressive Constitutional Court rulings on internal displacement, in particular the gender-sensitive Auto 092, constitute an attempt to bring together humanitarian interventions and transitional justice measures in a rights-based framework. However, the national government is reluctant to adopt them fully and local realities still hamper their integrated implementation. Displaced women, therefore, remain in an especially vulnerable position. This paper argues that gender-sensitive humanitarian interventions must take into account all of these complexities of scale and political process in order to make legal frameworks more effective at the local level. In these contexts, interventions should pay particular attention to strategies that contribute to transforming pre-existing gender regimes.

  15. Security Forces of the Kurdistan Regional Government

    Science.gov (United States)

    2009-02-26

    crisp uniforms. Those in the lower...ur o M em be r. G en er al S ta ff R eg io na l C om m an ds Fu nc tio na l C om m an ds P re si de nc y C ou nc il O pe ra tio ns (G 3) A dm in is...nc y C ou nc il O pe ra tio ns (G 3) A dm in is tra tio n/ Lo gi st ic s (G 1/ G 4) P es hm er ga M in is te r* Fi na nc e In sp ec to r G en er al

  16. Essential themes in Personnel economics

    OpenAIRE

    Josheski, Dushko

    2014-01-01

    In this paper are presented essential themes in the subject of personnel economics. In the first part analysis has been conducted on the impact of peer pressure on workplace behaviour. Then again models for compensation structures within firms, and their influence on the utility of work by employees. In the final section of the paper the productivity spillover effect has been analyzed, and the causes of existence of spillovers and their impact on workers’ productivity

  17. Modern methods of personnel dosimetry

    International Nuclear Information System (INIS)

    Kraus, W.; Herrmann, D.; Kiesewetter, W.

    The physical properties of radiation detectors for personnel dosimetry are described and compared. The suitability of different types of dosimeters for operational and central monitoring of normal occupational exposure, for accident and catastrophe dosimetry and for background and space-flight dosimetry is discussed. The difficulties in interpreting the dosimeter reading with respect to the dose in individual body organs are discussed briefly. 430 literature citations (up to Spring 1966) are given

  18. The LHC personnel safety system

    International Nuclear Information System (INIS)

    Ninin, P.; Valentini, F.; Ladzinski, T.

    2011-01-01

    Large particle physics installations such as the CERN Large Hadron Collider require specific Personnel Safety Systems (PSS) to protect the personnel against the radiological and industrial hazards. In order to fulfill the French regulation in matter of nuclear installations, the principles of IEC 61508 and IEC 61513 standard are used as a methodology framework to evaluate the criticality of the installation, to design and to implement the PSS.The LHC PSS deals with the implementation of all physical barriers, access controls and interlock devices around the 27 km of underground tunnel, service zones and experimental caverns of the LHC. The system shall guarantee the absence of personnel in the LHC controlled areas during the machine operations and, on the other hand, ensure the automatic accelerator shutdown in case of any safety condition violation, such as an intrusion during beam circulation. The LHC PSS has been conceived as two separate and independent systems: the LHC Access Control System (LACS) and the LHC Access Safety System (LASS). The LACS, using off the shelf technologies, realizes all physical barriers and regulates all accesses to the underground areas by identifying users and checking their authorizations.The LASS has been designed according to the principles of the IEC 61508 and 61513 standards, starting from a risk analysis conducted on the LHC facility equipped with a standard access control system. It consists in a set of safety functions realized by a dedicated fail-safe and redundant hardware guaranteed to be of SIL3 class. The integration of various technologies combining electronics, sensors, video and operational procedures adopted to establish an efficient personnel safety system for the CERN LHC accelerator is presented in this paper. (authors)

  19. Career path for operations personnel

    International Nuclear Information System (INIS)

    Asher, J.A.

    1985-01-01

    This paper explains how selected personnel can now obtain a Bachelor of Science degree in Physics with a Nuclear Power Operations option. The program went into effect the Fall of 1984. Another program was worked out in 1982 whereby students attending the Nuclear Operators Training Program could obtain an Associates of Science degree in Mechanical Engineering Technology at the end of two years of study. This paper presents tables and charts which describe these programs and outline the career path for operators

  20. Moral distress in nursing personnel

    OpenAIRE

    Barlem,Edison Luiz Devos; Lunardi,Valéria Lerch; Lunardi,Guilherme Lerch; Tomaschewski-Barlem,Jamila Geri; Silveira,Rosemary Silva da; Dalmolin,Graziele de Lima

    2013-01-01

    OBJECTIVE: to analyze the frequency and intensity of moral distress experienced by nursing personnel in southern Brazil, covering elements of their professional practice. METHOD: a survey was undertaken in two hospitals in Rio Grande do Sul, Brazil, with 247 nurses. Data was collected by means of the adapted Moral Distress Scale. RESULTS: the perception of situations that lead to moral distress is enhanced in nurses and in nursing staff working in institutions with greater openness to dialogu...

  1. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-06-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (1) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper will discuss the various types of security applications that are presently being considered for the above areas and will briefly describe a few examples of the application of this technology. Examples will include ground mobile platforms carrying alarm assessment and/or surveillance sensors and operating either autonomously or with telepresence by a remote operator. An airborne platform performing similar functions will also be discussed. An application of a type of robot sentry that would be fixed and incorporate very simple portable displays will also be described. A third type of robot, an interior robot, that could be used in sensitive or hazardous areas to do detection and assessment functions will be reviewed

  2. Opportunities and Risks for the Employment of Private Security Companies in Complex Contingencies

    National Research Council Canada - National Science Library

    Mayer, Christopher T

    2008-01-01

    .... Protection of noncombatant personnel, supplies, and facilities against terrorists, looting, and other lawlessness grows in importance while the availability of military forces cannot meet the demand...

  3. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  4. Personnel exposures in industrial radiography

    International Nuclear Information System (INIS)

    Shenoy, K.S.; Patel, P.H.

    1979-01-01

    The manifold increase in production, and ease of availability of radioisotopes in India have been responsible for a tremendous increase in use of radioisotopes in industrial radiography during past fifteen years. Among various applications of radioisotopes the industrial radiography involves a large potential risk of occupational radiation exposures. The dose records of past fifteen years in respect of all radiation workers maintained by the Personnel Monitoring Group of Division of Radiological Protection of the Bhabha Atomic Research Centre, Bombay, have been analysed. Analysis of excessive exposure (exceeding 400 mrem/fortnight) reveals that this figure is increasing at an alarming rate among the radiation workers of this category. In spite of various regulatory controls the dose per person per week has remained higher as compared to the same in other categories. This combined with the increase in number of radiation workers every year would soon contribute significantly to the per capita dose for radiation workers. Use of adequately shielded fool-proof remote control equipment and training of all personnel in safe handling of radiation sources seem to be the only solution to arrest the rate of increase in personnel exposures of this category. (auth.)

  5. Subatomic forces

    International Nuclear Information System (INIS)

    Sutton, C.

    1989-01-01

    Inside the atom, particles interact through two forces which are never felt in the everyday world. But they may hold the key to the Universe. These ideas on subatomic forces are discussed with respect to the strong force, the electromagnetic force and the electroweak force. (author)

  6. National Finance Center Personnel/Payroll System

    Data.gov (United States)

    US Agency for International Development — The NFC system is an USDA system used for processing transactions for payroll/personnel systems. Personnel processing is done through EPIC/HCUP, which is web-based....

  7. Supporting the personnel reliability decision-making process with artificial intelligence

    International Nuclear Information System (INIS)

    Harte, D.C.

    1991-01-01

    Recent legislation concerning personnel security has vastly increased the responsibility and accountability of the security manager. Access authorization, fitness for duty, and personnel security access programs require decisions regarding an individual's trustworthiness and reliability based on the findings of a background investigation. While these guidelines provide significant data and are useful as a tool, limited resources are available to the adjudicator of derogatory information on what is and is not acceptable in terms of granting access to sensitive areas of nuclear plants. The reason why one individual is deemed unacceptable and the next acceptable may be questioned and cause discriminatory accusations. This paper is continuation of discussion on workforce reliability, focusing on the use of artificial intelligence to support the decisions of a security manager. With this support, the benefit of previous decisions helps ensure consistent adjudication of background investigations

  8. Homosexuality in the Dutch Armed Forces 2006

    NARCIS (Netherlands)

    Anna Adolfsen; Saskia Keuzenkamp; m.m.v. Linda Mans

    2006-01-01

    Original title: Uniform uit de kast. This study looks at the attitudes of defence personnel to homosexuality. How do members of the military view homosexual colleagues? Can gays and lesbians working in the armed forces be open about their sexual preferences? Do they regard the armed forces as

  9. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  10. Optimisation of the Process of Managing Personnel Security of a Company Оптимизация процесса управления кадровой безопасностью предприятий

    Directory of Open Access Journals (Sweden)

    Mіshin Aleksandr Yu.

    2013-02-01

    Full Text Available The article analyses existing approaches to managing personnel security of business units at a micro level; it considers notional and categorical mechanism, environment of formation of the system of managing personnel security of a company; specifies scientific and theoretical approach to optimisation of the process of managing personnel security of a company by means of identification of stages, subsystems of management, interdependencies and interconnections between them, which, unlike existing approaches, ensures rational combination of system and situation oriented management.Проанализированы существующие подходы к управлению кадровой безопасностью бизнес-единиц на микроуровне; рассмотрен понятийно-категориальный аппарат, среда формирования системы управления кадровой безопасностью предприятия; уточнён научно-теоретический подход к оптимизации процесса управления кадровой безопасностью предприятий за счет определения этапов, подсистем управления, взаимозависимостей и взаимосвязей между ними, что, в отлич��и от существующих подходов, обеспечивает рациональное сочетание системно и ситуационно ориентированного управления.

  11. Understanding the security management practices of humanitarian organizations.

    Science.gov (United States)

    Bollettino, Vincenzo

    2008-06-01

    Humanitarian organisations operate in increasingly hostile environments. Although authoritative statistics are scarce, anecdotal evidence suggests that aid workers face life-threatening risks that are exacerbated by the growing number of humanitarian organisations operating in the field, the diversity of their mandates, the lack of common professional security standards, and limited success in inter-agency security coordination. Despite broad acceptance of the need for better security management and coordination, many humanitarian organisations remain ambivalent about devoting increased resources to security management and security coordination. A critical lack of basic empirical knowledge of the field security environment hampers efforts to enhance security management practices. The absence of a systematic means of sharing incident data undermines the capacity of the humanitarian community to address proactively security threats. In discussions about humanitarian staff safety and security, the least common denominator remains cumulative anecdotal evidence provided by the many security personnel working for humanitarian organisations in the feld.

  12. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG--014 Military Pay and Personnel System... Security U.S. Coast Guard--014 Military Pay and Personnel System of Records.'' This system of records allows the Department of Homeland Security U.S. Coast Guard to collect and maintain records regarding pay...

  13. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  14. 10 CFR 36.55 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 36.55 Section 36.55 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS Operation of Irradiators § 36.55 Personnel monitoring. (a) Irradiator operators shall wear a personnel dosimeter that is...

  15. 49 CFR 193.2711 - Personnel health.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Personnel health. 193.2711 Section 193.2711 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2711 Personnel health. Each operator...

  16. Personnel Development Practices in Turkish Education System

    Science.gov (United States)

    Ozdemir, Tuncay Yavuz

    2016-01-01

    Nowadays everything develops and changes very quickly and sustainability of organizational goals will be possible only when personnel can keep up with these changes. From administrative aspect it is important to enhance personnel's potential and prompt them to achieve organizational goals. Personnel development is a process which influences and…

  17. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  18. Current personnel dosimetry practices at DOE facilities

    International Nuclear Information System (INIS)

    Fix, J.J.

    1981-05-01

    Only three parameters were included in the personnel occupational exposure records by all facilities. These are employee name, social security number, and whole body dose. Approximate percentages of some other parameters included in the record systems are sex (50%), birthdate (90%), occupation (26%), previous employer radiation exposure (74%), etc. Statistical analysis of the data for such parameters as sex versus dose distribution, age versus dose distribution, cumulative lifetime dose, etc. was apparently seldom done. Less than 50% of the facilities reported having formal documentation for either the dosimeter, records system, or reader. Slightly greater than 50% of facilities reported having routine procedures in place. These are considered maximum percentages because some respondents considered computer codes as formal documentation. The repository receives data from DOE facilities regarding the (a) distribution of annual whole body doses, (b) significant internal depositions, and (c) individual doses upon termination. It is expected that numerous differences exist in the dose data submitted by the different facilities. Areas of significant differences would likely include the determination of non-measurable doses, the methods used to determine previous employer radiation dose, the methods of determining cumulative radiation dose, and assessment of internal doses. Undoubtedly, the accuracy of the different dosimetry systems, especially at low doses, is very important to the credibility of data summaries (e.g., man-rem) provided by the repository

  19. Certification of Canadian nuclear power plant personnel

    International Nuclear Information System (INIS)

    Newbury, F.

    2014-01-01

    The Canadian Nuclear Safety Commission (CNSC) regulates the use of nuclear energy and materials to protect health, safety, security of Canadians and the environment, and to implement Canada's international commitments on the peaceful use of nuclear energy. As part of its mandate, the CNSC requires certification of those who work in positions with direct impact on the safety of Canadian nuclear power plants (NPPs) and research reactors. Other positions, such as exposure device operators and radiation safety officers at other nuclear facilities, also require CNSC certification. In this paper, the certification process of Canadian NPP personnel will be examined. In keeping with the CNSC's regulatory philosophy and international practice, licensees bear the primary responsibility for the safe operation of their NPPs. They are therefore held entirely responsible for training and testing their workers, in accordance with applicable regulatory requirements, to ensure they are fully qualified to perform their duties. The CNSC obtains assurance that all persons it certifies are qualified to carry out their respective duties. It achieves this by overseeing a regime of licensee training programs and certification examinations, which are based on a combination of appropriate regulatory guidance and compliance activities. Reviews of the knowledge-based certification examination methodology and of lessons learned from Fukushima have generated initiatives to further strengthen the CNSC's certification programs for NPP workers. Two of those initiatives are discussed in this paper. (author)

  20. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  1. Reflections on Africa's Security Situation: An Examination of Nigeria ...

    African Journals Online (AJOL)

    One of the greatest challenges that twenty-first century African states face is that of security. Of the four arms of the state security system, namely, the Army, Air Force, Navy and Police, the latter has been the most taunted. Ordinarily, the Police Force, being the closest of all the forces to civilians, is expected to be the protector ...

  2. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  3. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  4. A guide for developing an ADP security plan for Navy Finance Center, Cleveland, Ohio

    OpenAIRE

    Barber, Daniel E.; Hodnett, Elwood Thomas, Jr.

    1982-01-01

    Approved for public release; distribution is unlimited This paper is intended to be used as a guide by personnel at the Navy Finance Center (NFC) Cleveland, Ohio in developing an Automatic Data Processing (ADP) Security Plan. An effort has been made to combine the requirements for an ADP security plan established by OPNAVINST5239.1A with pertinent information from other selected readings. The importance of the devotion of personnel, time and funds to ADP security planning has been emphas...

  5. Development of an integrated campus security alerting system ...

    African Journals Online (AJOL)

    This work presents an integrated alerting system which uses both the Internet Protocol (IP) cameras and micro-switches for monitoring security situations thereby providing an immediate alerting signal to the security personnel. The system has the input unit, processing unit, control unit and the power supply unit as its ...

  6. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  7. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  8. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  9. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  10. [Retrospective study of ALS in French military personnel].

    Science.gov (United States)

    Drouet, A; Desjeux, G; Balaire, C; Thevenin-Garron, V

    2010-01-01

    An apparent increased risk for developing Amyotrophic Lateral Sclerosis (ALS), a multifactorial neurodegenerative disease, is considered to exist in the military population. ALS military and veteran patients were retrospectively recruited in April 2008 by searching medical data (Hippocrate) and repayment data (Erasme) of the French National Military Health Care Fund (Caisse nationale militaire de sécurité sociale, CNMSS) from de January 1991 to December 2007. We report a series of 73 patients, 69 male and four female, average age of 52.5 years (range 27 to 72 years) with a peak of patients in the 50-59 year age class. The branch of military service was Army (n=26 patients), Air force (n=14), Navy (n=10) and State Police Force (n=22). The incidence among male active duty military personnel was stable from 2002 to 2007; it was less than the general population (1.7/100,000 per year in 2007), but higher in the 40-44 and 50-54 year age classes (1.90 and 5.07/100,000 per year in 2007 respectively). Duration of active duty was on average 31 years. The retrospective nature of the data and the incomplete population with loss of retired military personnel without CNMSS affiliation are limitations of our study. Another means of collecting all cases of ALS among French military personnel and veterans would be to conduct a search in the 17 ALS centers in France with analysis by occupational activity for entire career.

  11. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  12. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  13. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  14. Special feature article-very urgent nuclear energy personnel training

    International Nuclear Information System (INIS)

    Saito, Shinzo; Tsujikura, Yonezo; Kawahara, Akira

    2007-01-01

    Securing human resources is important for the sustainable development of research, development and utilization of nuclear energy. However, concerns have been raised over the maintenance of human resources due to the decline of public and private investment in research and development of nuclear energy in recent years. To that end, it is essential for the workplace in the field of nuclear energy to be engaging. This special feature article introduced the Government's fund program supporting universities and vocational colleges to develop human resources in the area of nuclear energy. Electric utilities, nuclear industries, nuclear safety regulators and related academia presented respective present status and issues of nuclear energy personnel training with some expectations to the program to secure human resources with professional qualifications. (T. Tanaka)

  15. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  16. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  17. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  18. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  19. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  20. 76 FR 63811 - Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and...

    Science.gov (United States)

    2011-10-13

    ... implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and... policies and minimum standards will address all agencies that operate or access classified computer...

  1. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  2. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  3. An Investigation of Social Factors Affecting on Personnel Job Satisfaction of Remedial Service Insurance Department

    Directory of Open Access Journals (Sweden)

    Sayyed Yaser Ebrahimian Jolodar

    2012-01-01

    Full Text Available Because of the paramount importance of job satisfaction and due to its main consequences such as reduction of work absence and resignation, personnel promotion and society‟s health, and more importantly, its role in achievement of organization goals, this study aimed at investigating the effects of six social factors including personnel‟s belief, salary and benefits, participation in organizational decision-making, sense of job security, interaction with colleagues and meeting the basic needs of personnel on job satisfaction. The statistical population of this study was the personnel of Remedial Service Insurance Department in Sari and the questionnaire was distributed among them. The results showed that there is a significant and positive correlation among all these factors and they have meaningful effects on personnel job satisfaction based on multiple regression analysis. Furthermore, findings revealed that personnel‟s belief about their job has the most effects on job satisfaction.

  4. Arms Control and European Security

    Science.gov (United States)

    2012-08-01

    appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of...sophisticated Marxist theories of conflict, the balance or “correlation” of forces: political and psy- chological force fields generated in peacetime or...wider political 18 and economic considerations, within hygienic, legally enforceable, Kantian “Euro Atlantic Security Struc- tures,” the Holy Grail

  5. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  6. Developing Iraq's Security Sector: The Coalition Provisional Authority's Experience

    National Research Council Canada - National Science Library

    Rathmell, Andrew; Oliker, Olga; Kelly, Terrence K; Brannan, David; Crane, Keith

    2005-01-01

    .... The environment was not benign -- it was deteriorating. Iraqi security forces had largely disintegrated, and those that remained were incapable of responding to rising criminality and political violence...

  7. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  8. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  9. 5 CFR 930.210 - Reduction in force.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Reduction in force. 930.210 Section 930... § 930.210 Reduction in force. (a) Retention preference regulations. Except as modified by this section, the reduction in force regulations in part 351 of this chapter apply to administrative law judges. (b...

  10. 5 CFR 359.405 - Removal: Reduction in force.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Removal: Reduction in force. 359.405... Appointees During Probation § 359.405 Removal: Reduction in force. (a) Coverage. This section covers the removal of a career appointee from the SES during the probationary period under a reduction in force. (b...

  11. Burnout among Danish prison personnel

    DEFF Research Database (Denmark)

    Andersen, Dorte Raaby; Andersen, Lars Peter; Gadegaard, Charlotte Ann

    2017-01-01

    Objectives The objective of this follow-up study was to investigate associations between individual, occupational and work environment factors and burnout among both uniformed and non-uniformed personnel working in the Danish Prison and Probation Service. Methods The participants (N = 4808......) with client contact received a questionnaire in 2010 and again in 2011. In 2010, 2843 participants responded to the questionnaire (59.1%), and in 2011, 1741 responded to the questionnaire, yielding a response rate of 61.2% of the baseline population, and 36.2% of the invited population. Burnout and work...... characteristics were measured with validated scales from the Copenhagen Psychosocial Questionnaire, and data was analysed by logistic regression. Results Risk factors with the highest impact on burnout were work environmental factors: quantitative demands, emotional demands, involvement in and meaning of work...

  12. The Daresbury personnel safety system

    International Nuclear Information System (INIS)

    Poole, D.E.; Ring, T.

    1989-01-01

    The personnel safety system designed for the SRS at Daresbury is a unified system covering the three accelerators of the source itself, the beamlines and the experimental stations. The system has also been applied to the experimental areas of the Nuclear Structure Facility, and is therefore established as a site standard. A dual guardline interlock module forms a building block for a relay based interlock system completely independent of the machine control system, although comprehensive monitoring of the system status via the control system computer is a feature. An outline of the design criteria adopted for the system is presented together with a more detailed description of the philosophy of the guardline logic and the way this is implemented in a standard modular form. The emphasis is on the design features of a modern microprocessor based variant of the original SRS system. Experience with the original system during build-up and operation of the SRS facility is described. 2 refs., 4 figs

  13. Director general presentation to personnel

    CERN Multimedia

    2016-01-01

    Dear Colleagues, Many important discussions are scheduled for the upcoming Council Week (13-17 June) on topics including the Medium-Term Plan, the Pension Fund and other matters of great relevance to us.   I would therefore like to share the main outcome of the week with you and I invite you to join me and the Directors in the Main Auditorium at 10 a.m. on Thursday 23 June. The meeting will last about one hour and a webcast will also be available. Best regards, Fabiola Gianotti DG presentation to personnel Thursday 23 June at 10 am Main Auditorium Retransmission in Council Chamber, IT Auditorium, Kjell Jonhsen Auditorium, Prevessin 864-1-C02 Webcast on cern.ch/webcast More information on the event page.

  14. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ..., %%Strategy for Victory," the Bush Administration indicates that U.S. forces will remain in Iraq until the country is able to provide for its own security and does not serve as a host for radical Islamic terrorists...

  15. Expeditionary Border Security Operations: Eliminating the Seams

    National Research Council Canada - National Science Library

    Zinno, Michael J

    2008-01-01

    .... This convergence greatly expands the scope and capability of each individual terrorist or criminal organization and the cumulative effect can overwhelm the security forces of many nations and provide...

  16. DefenseLink: Securing Afganistan, Stabilization & Growth

    Science.gov (United States)

    since, the International Security Assistance Force, under NATO leadership, has taken charge of extensive conditions for the growth of an effective, democratic national government in Afghanistan. As the lead member

  17. Securing military information systems on public infrastructure

    CSIR Research Space (South Africa)

    Botha, P

    2015-03-01

    Full Text Available to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared...

  18. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  19. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  20. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...