WorldWideScience

Sample records for security personnel

  1. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  2. Employment of security personnel

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. In his comments, W. Hunold accedes to the court's decision and discusses the underlying reasons of this decision and of a previous ruling in the same matter by putting emphasis on the difference between a contract for services and a contract for work, and a contract for temporary employment. The author also discusses the basic features of an employment contract. (orig./HP) [de

  3. Site security personnel training manual

    International Nuclear Information System (INIS)

    1978-10-01

    As required by 10 CFR Part 73, this training manual provides guidance to assist licensees in the development of security personnel training and qualifications programs. The information contained in the manual typifies the level and scope of training for personnel assigned to perform security related tasks and job duties associated with the protection of nuclear fuel cycle facilities and nuclear power reactors

  4. Education and training for security personnel

    International Nuclear Information System (INIS)

    Chida, Toshiya

    2015-01-01

    It is said that Physical Protection (PP) has two purposes. One is to prevent from occurring risks of threat and terrorism and the other is to minimize damages which will be happened in case of unusual conditions or emergency situation. To achieve this goal, personnel who perform their duties should have professional knowledge and skills concerning security. However, since newcomers rarely satisfy their knowledge and skill for nuclear security in most cases. Therefore, we have to provide adequate education and training after they joined to our company. To this end, our company, located in Aomori Prefecture focused on security and physical protection for nuclear related facilities. In this paper, personnel training and challenges in order to bring up security personnel at our company will be introduced. (author)

  5. 32 CFR 154.42 - Evaluation of personnel security information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  6. Investigation of Shift Work Disorders among Security Personnel

    OpenAIRE

    Zahra Zamanian; Mansooreh Dehghani; Heidar Mohammady; Mohammadtaghi Rezaeiani; Hadi Daneshmandi

    2012-01-01

    In today’s advanced world resulting from the improvement of technology, societies tend to encounter a large number of problems and accidents. As we know, university’s security personnel are classified as shift workers and are exposed to health disturbing factors. The aim of this study was investigation of shiftwork disorders among security personnel of the hospitals Affiliated to Shiraz University of Medical Sciences, Central. This case-control study was conducted among 130 security personnel...

  7. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  8. Security personnel training using a computer-based game

    International Nuclear Information System (INIS)

    Ralph, J.; Bickner, L.

    1987-01-01

    Security personnel training is an integral part of a total physical security program, and is essential in enabling security personnel to perform their function effectively. Several training tools are currently available for use by security supervisors, including: textbook study, classroom instruction, and live simulations. However, due to shortcomings inherent in each of these tools, a need exists for the development of low-cost alternative training methods. This paper discusses one such alternative: a computer-based, game-type security training system. This system would be based on a personal computer with high-resolution graphics. Key features of this system include: a high degree of realism; flexibility in use and maintenance; high trainee motivation; and low cost

  9. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  10. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  11. Analysis of Specific Features of International Standards of Personnel Security of an Enterprise

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P.

    2014-03-01

    Full Text Available The article marks out components of personnel security of an enterprise, outlines processes of personnel management, which correspond with conditions of security of life and labour, competent, socially protected professional activity, availability of the acting system of motivation and stimulation, and possibilities for corporate conflicts resolution. The article presents basic standards, rules and legislative acts that regulate ensuring personnel security. It analyses specific features of application of standards with respect to: life security and labour protection culture at an enterprise, including managerial systems and practice, behaviour of personnel at working places and also intellectual component of personnel security, which envisages that personnel has knowledge and competences that assist in achievement of strategic goals of an enterprise.

  12. Improving method for calculating integral index of personnel security of company

    Directory of Open Access Journals (Sweden)

    Chjan Khao Yui

    2016-06-01

    Full Text Available The paper improves the method of calculating the integral index of personnel security of a company. The author has identified four components of personnel security (social and motivational safety, occupational safety, not confliction security, life safety which are characterized by certain indicators. Integral index of personnel security is designed for the enterprises of machine-building sector in Kharkov region, taking into account theweight coefficients j-th component of bj, and weighting factors that determine the degree of contribution of the ith parameter in the integral index aіj as defined by experts.

  13. The Methodological Approach to Determining the Level of Formation and Provision of Enterprise Personnel Security

    Directory of Open Access Journals (Sweden)

    Gavkalova Nataliia L.

    2016-11-01

    Full Text Available The aim of the article is to substantiate the methodical approach to determining the level of formation and provision of enterprise personnel security. By analyzing, systematizing and generalizing scientific achievements of many scientists, approaches to the evaluation of personnel security at the enterprise were considered, a set of indices for evaluation of personnel security was defined. There justified the urgency of creating a comprehensive approach to evaluation of personnel security that includes implementation of the following stages: defining a list of indices corresponding to the level of formation and provision of personnel security with the help of the expert evaluation method; calculating integral indices of personnel security for each component and the corresponding level by means of the taxonomic analysis; grouping enterprises by the level of formation and provision of personnel security with the use of the cluster and discriminant analysis. It is found that the implementation of this approach will allow not only determining the level of formation and provision of personnel security at the enterprise, but also developing appropriate recommendations on improving its state. Prospects for further research in this direction are evaluation of conditions for formation and provision of personnel security at the enterprise, which will enable revealing negative destabilizing factors that influence personnel security

  14. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  15. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  16. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  17. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  18. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  19. Improving Mental Health Reporting Practices in Between Personnel Security Investigations

    Science.gov (United States)

    2017-06-01

    derogatory information, unfavorable administrative actions, and adverse actions to the appropriate personnel security, human resources , and...national security clearance? What type of clearances do people typically have (e.g., Secret, Top Secret, TS/SCI, SAP , etc.)? (2) Does [the

  20. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  1. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    Science.gov (United States)

    2013-11-12

    to capture and transmit fingerprints . • Accurate Biometrics , a commercial Livescan fingerprinting provider, also received fingerprints electronically...FOUO). Monterey, CA: Defense Personnel Security Research Center. Herbig, K. L. (2008). Changes in espionage by American citizens , 1947-2007. (Tech...by American citizens , 1947-2001. (Tech. Rep. 02-05). Monterey, CA: Defense Personnel Security Research Center. Heuer, Jr., R. J., Crawford, K. S

  2. Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach.

    Science.gov (United States)

    Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem

    2013-01-01

    This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff.

  3. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  4. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  5. Health consequences of shift-work: the case of iranian hospital security personnel.

    Science.gov (United States)

    Abedini, Roghayeh; Soltanzadeh, Ahmad; Faghih, Mohammad Amin; Mohammadi, Heidar; Kamalinia, Mojtaba; Mohraz, Majid Habibi; Arassi, Maziyar; Veyseh, Peyman Piran; Aghaei, Hamed; Hosseini, Seyed Younes

    2015-01-01

    Shift-work, which is an ergonomics issue in workplaces, can negatively affect workers. The security personnel of medical centers in Iran have multiple responsibilities and consequently are exposed to such unwanted situations as observing patients, disputing with patient's attendants, unwanted shift schedules, and being away from family for long periods. This study assessed health problems of Iranian hospital security personnel (shift-worker personnel) using the Survey of Shift-workers (SOS) questionnaire (Persian version). This cross-sectional study was conducted in seven medical centers (4 hospitals and 3 clinics). A total of 416 workers were surveyed: shift-workers (exposed group) (n=209) and non-shift-workers (unexposed group) (n=207). The prevalence of adverse health effects was higher in shift-workers than day-workers. The level of education and mean Body Mass Index (BMI) in shift-workers were significantly higher compared with day-workers. The prevalence of gastrointestinal disorders, cardiovascular and psychological problems were also significantly higher in shift-workers compared with day-workers. Overall, the prevalence of health problems among the security personnel of medical centers was high. Hence, it is recommended that personnel be put under periodic monitoring and receive medical counseling and treatment if there is any disorder.

  6. 28 CFR 16.132 - Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records...

    Science.gov (United States)

    2010-07-01

    ... System—Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ-006. 16.132...

  7. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  8. Results of nuclear security culture survey on personnel at nuclear power plants

    International Nuclear Information System (INIS)

    Yoo, Hosik; Lee, Jeong-Ho

    2015-01-01

    Highlights: • A new surveying questionnaire for evaluating the security awareness of personnel was developed. • The developed surveying tools consist of four categories and 44 questions in total. • The surveying tools developed in this study can be used in other countries. - Abstract: A survey to evaluate awareness of the nuclear security culture of personnel at nuclear facilities was developed. The survey was made up of a series of questionnaires that were divided into four categories, beliefs and attitude, operating systems, leadership behaviors and staff behaviors. Each category contained six to 16 questions. The category on beliefs and attitude was composed of questions that asked plant workers on how much consideration facility personnel give to issues of security when doing his/her work. The section pertaining to operating systems for nuclear security consisted of questions on guidance documents, information security, and education and training. The questions on leadership behaviors were separated into two parts, one for managers and another for staff. These include questions relating to communication between management and staff, surveillance work related to nuclear security and the sharing of information. The last category of questions concerned staff behaviors. It consisted of questions on knowledge, procedures and implementation related to nuclear security. A survey was conducted on 858 people who worked at nuclear power plants using the questionnaire that was developed in this study. The survey was performed between October 7 to 17, 2014. The survey results were collected and analyzed. A numerical value was given to each question, so that the results of the survey were represented as a score. The data revealed that awareness of the nuclear security culture increased with age. This increase stopped when staff members entered their 50s. It is believed that a person in his/her 50s has a greater degree of experience and passion for their work than

  9. Employment of personnel of a security service company does not require the consent of the works council

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. Federal Labour Court, decision dated May 5, 1992 - 1 ABR 78/91. (orig./HP) [de

  10. Basic legal provisions concerning the activities of industrial security personnel

    International Nuclear Information System (INIS)

    Eberstein, H.H.

    1980-01-01

    The author confines himself to sabotage and espionage. Necessary counter-measures are determined by the respective type of activities. Sect. 618 of the German Civil Code and Sect. 120 a of the Industrial Code give basic legal provisions for the protection of industrial personnel. The legal position held by owner or occupant forms the legal basis for 'vulnerable point protection'. The owner's rights are assigned to the industrial police and are exercised in correspondence with the service or employment contract set up according to Sect. 611 and the following sections of the German Civil Code. Outside guards work according to the performance contract given int the Sections 675, 611, 631 of the German Civil Code. The security personnel has the common right of self-help: self-defence, civil rights concerning the state of national emergency and self-defence under criminal law, rights derived from ownership and property. The author critically argues views held by Mr. Hoffmann-Riem who thinks that police powers have been assigned to private persons. He definitely answers in the negative to the execution of, or encroachment on, sovereign (police) powers by industrial security personnel. A special legal regulation is not necessary, since private protection in form of professional selfdefence is admissible under the law in force. (HSCH) [de

  11. 49 CFR 1522.121 - Security threat assessments for personnel of TSA-approved validation firms.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for personnel of TSA... FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation... for personnel of TSA-approved validation firms. Each of the following must successfully complete a...

  12. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  13. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  14. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  15. Evaluation of scattered radiation emitted from X-ray security scanners on occupational dose to airport personnel

    International Nuclear Information System (INIS)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-01-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits. - Highlights: • Backscattered radiation emitted from the airport security scanners is estimated. • Inverse relation observed between backscattered radiation and scanners distance. • Occupational dose for personnel inspecting the scanners were up to 2.04 mSv/y. • The projected dose of security and engineering staff are well within dose limits.

  16. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  17. Machine vision applications for physical security, quality assurance and personnel dosimetry

    International Nuclear Information System (INIS)

    Kar, S.; Shrikhande, S.V.; Suresh Babu, R.M.

    2016-01-01

    Machine vision is the technology used to provide imaging-based solutions to variety of applications, relevant to nuclear facilities and other industries. It uses computerized image analysis for automatic inspection, process control, object sorting, parts assembly, human identity authentication, and so on. In this article we discuss the in-house developed machine vision systems at EISD, BARC for three specific areas: Biometric recognition for physical security, visual inspection for QA of fuel pellets, and fast neutron personnel dosimetry. The advantages in using these systems include objective decision making, reduced man-rem, operational consistency, and capability of statistical quantitative analysis. (author)

  18. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    Science.gov (United States)

    2015-12-01

    culture, morale, and job satisfaction levels of employees .28 Gerstein argues the development of a Homeland Security personnel system and career maps...and culture, low morale, and job satisfaction levels of employees . DHS has been following a similar approach to the DOD in terms of professional...Homeland Security in its ability to accomplish its mission. Leadership weaknesses, insufficient education and training for employees , and retention

  19. Lack of skilled personnel as threat to HR security of industrial enterprises

    Directory of Open Access Journals (Sweden)

    Ozernikova Tatiana

    2017-01-01

    Full Text Available The article assesses the needs of Russian industrial enterprises for skilled labor. The authors consider deficiency in qualified personnel as a threat to the human resources security of industrial enterprises, and analyze its causes. The study includes the criteria to distinguish highly skilled employees in the labor force (education level, occupation, correspondence of performed work to education, and analysis of the dynamics of their number. It identifies the internal and external factors that have a significant influence on the number of qualified personnel. The external factors include the size of the salary, population growth due to migration, the regional level of the socio-economic development. The applied methods of analysis are single-factor analysis of variance (F-test, multiple regression and descriptive statistics. The analysis is based on the materials of the Russian Federal State Statistics Service, as well as on the Russian Longitudinal Monitoring Survey - Higher School of Economics.

  20. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  1. Personnel Investigations and Clearance Tracking (OPI)

    Data.gov (United States)

    Office of Personnel Management — Security file-related information for the U.S. Office of Personnel Management (OPM)'s employee and contractor personnel. The data is OPM-specific, not government-wide.

  2. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  3. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  4. Reprint of 'Evaluation of Scattered Radiation Emitted From X-ray Security Scanners on Occupational Dose to Airport Personnel'

    Science.gov (United States)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-11-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits.

  5. Codetermination of the works council in matterss of a security screening of personnel

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If the licensing authority issues a licence to the operator of a nuclear installation subject to the obligation to have personnel to be employed or to be kept on screened for security purposes by the licensing authority, the works council of the nuclear installation is not in the position to demand refrainment from screening activities unless the works council has given consent. (BAGE 58, 297 = NZA 1988, 811 = AP Paragraph 87 BetrVG 1972 - Ordnung des Betriebes - Nr. 14). Decision of the Federal Labour Court of July 9, 1991 - 1 ABR 57/90 (lower instance: LAG Koeln, decision dated June 12, 1990 - 4 TaBV 2/90). (orig.) [de

  6. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  7. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  8. Report: EPA’s Information Systems and Data Are at Risk Due to Insufficient Training of Personnel With Significant Information Security Responsibilities

    Science.gov (United States)

    Report #14-P-0142, March 21, 2014. The EPA places its information systems and data at risk due to an organizational structure that has not specified required duties and responsibilities to ensure personnel are trained on key information security roles.

  9. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (l) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper discusses the various types of security applications that are presently being considered for the above areas and briefly describes a few examples of the application of this technology

  10. 49 CFR 1542.219 - Supplementing law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Supplementing law enforcement personnel. 1542.219 Section 1542.219 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.219 Supplementing law...

  11. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  12. 10 CFR 712.16 - DOE security review.

    Science.gov (United States)

    2010-01-01

    ... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file... 10 Energy 4 2010-01-01 2010-01-01 false DOE security review. 712.16 Section 712.16 Energy... Program Procedures § 712.16 DOE security review. (a) A personnel security specialist will perform a...

  13. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  14. Assessing Psycho-Social Resilience in Diplomatic, Civilian & Military Personnel Serving in a High-Threat Security Environment during Counter-Insurgency and Counter-Terrorism Operations in Iraq

    Directory of Open Access Journals (Sweden)

    Anne Speckhard

    2012-08-01

    Full Text Available Currently thousands of military, diplomatic and civilian personnel are deployed under NATO, UN, and other multi-national, as well as national auspices in high-threat security environments, including active conflict zones such as Iraq and Afghanistan.  Soldiers are generally well trained and prepared psychologically to face armed conflict. Civilian contractors and diplomats, on the other hand, often are not.  Moreover in today’s high-threat security environments terrorists, insurgents and even child soldiers may be the opposing force, creating a more uncertain and anxiety provoking environment and more difficult to identify security threat. These facts have serious implications for the psycho-social resilience of diplomatic, civilian and military personnel deployed in such environments.  This article investigates psycho-social resilience in a small exploratory sample of US embassy staff, contractors and US forces serving in Iraq during 2007, a time when Improvised Explosive Devices (IEDs, roadside bombings, mortar attacks, kidnappings, murders and sniper fire were an everyday occurrence in Iraq.

  15. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  16. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  17. PLC-based search and secure interlock system for the personnel safety in folded tandem ion accelerator

    International Nuclear Information System (INIS)

    Padmakumar, Sapna; Subramanyum, N.B.V.; Bhatt, Jignesh P.; Ware, Shailaja V.; Kansara, M.J.; Gupta, S.K.; Singh, P.

    2006-01-01

    Safety of the personnel is one of the key issues addressed in any accelerator project. The FOTIA facility at BARC is capable of operating under standard operation conditions without any radiation hazard. Even then for a safe and reliable operation of FOTIA a PLC (Programmable logic controller) based interlock system has been implemented. This interlocking system is compact, modular, flexible, robust and easy for troubleshooting. These advantages led to the popularity of PLC rather than using a relay-based system. This paper highlights the salient features of the search and secure interlock for the personal safety of FOTIA. (author)

  18. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    Science.gov (United States)

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  19. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  20. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  1. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  2. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  3. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  4. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-06-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (1) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper will discuss the various types of security applications that are presently being considered for the above areas and will briefly describe a few examples of the application of this technology. Examples will include ground mobile platforms carrying alarm assessment and/or surveillance sensors and operating either autonomously or with telepresence by a remote operator. An airborne platform performing similar functions will also be discussed. An application of a type of robot sentry that would be fixed and incorporate very simple portable displays will also be described. A third type of robot, an interior robot, that could be used in sensitive or hazardous areas to do detection and assessment functions will be reviewed

  5. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  6. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  7. Cold Vacuum Dryer (CVD) Facility Security System Design Description. System 54

    International Nuclear Information System (INIS)

    WHITEHURST, R.

    2000-01-01

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas

  8. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  9. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Science.gov (United States)

    2010-10-01

    ... information technology (IT) system, as required by the Department of Commerce Security Manual and Department of Commerce Security Program Policy and Minimum Implementation Standards. (b) Insert clause 1352.237... as National Security Contracts that will be performed on or within a Department of Commerce facility...

  10. Supporting the personnel reliability decision-making process with artificial intelligence

    International Nuclear Information System (INIS)

    Harte, D.C.

    1991-01-01

    Recent legislation concerning personnel security has vastly increased the responsibility and accountability of the security manager. Access authorization, fitness for duty, and personnel security access programs require decisions regarding an individual's trustworthiness and reliability based on the findings of a background investigation. While these guidelines provide significant data and are useful as a tool, limited resources are available to the adjudicator of derogatory information on what is and is not acceptable in terms of granting access to sensitive areas of nuclear plants. The reason why one individual is deemed unacceptable and the next acceptable may be questioned and cause discriminatory accusations. This paper is continuation of discussion on workforce reliability, focusing on the use of artificial intelligence to support the decisions of a security manager. With this support, the benefit of previous decisions helps ensure consistent adjudication of background investigations

  11. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    Science.gov (United States)

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  12. Automating the personnel dosimeter monitoring program

    International Nuclear Information System (INIS)

    Compston, M.W.

    1982-12-01

    The personnel dosimetry monitoring program at the Portsmouth uranium enrichment facility has been improved by using thermoluminescent dosimetry to monitor for ionizing radiation exposure, and by automating most of the operations and all of the associated information handling. A thermoluminescent dosimeter (TLD) card, worn by personnel inside security badges, stores the energy of ionizing radiation. The dosimeters are changed-out periodically and are loaded 150 cards at a time into an automated reader-processor. The resulting data is recorded and filed into a useful form by computer programming developed for this purpose

  13. 78 FR 35042 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2013-06-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0407] Merchant Marine Personnel... Labor Organization's Maritime Labour Convention, 2006.'' This meeting will be open to the public. DATES... words ``Department of Homeland Security'' and the docket number for this action. Comments received will...

  14. The Intensification of the Personnel Role.

    Science.gov (United States)

    Wangler, Lawrence A.

    1979-01-01

    Discusses personnel profession's increased responsibilities which are due to (1) consolidation of the Equal Employment Opportunity Commission, (2) labor law reform, (3) privacy legislation, (4) social security legislation, (5) open retirement, (6) medical plan costs, (7) codetermination, (8) labor scarcity, (9) top management compensation, and…

  15. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  16. 33 CFR 105.210 - Facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of the...

  17. 2014 Year End Report: Center for Development of Security Excellence

    Science.gov (United States)

    2014-01-01

    Personnel Security Adjudications In August 2014, LT Tetyana Muirhead, a U.S. Navy Nurse , earned her Certificates in Security Leadership and in...website or on the CDSE YouTube channel. Personnel can watch the webinars and download associated job aids and resources. CDSE OPEN ELEARNING COURSES

  18. Dental Health Status and Treatment Needs of Police Personnel of a ...

    African Journals Online (AJOL)

    Background: Oral health is an integral part of general health. Police personnel form the backbone for safety and security of a community hence their health is of utmost importance. Aim: The present study was conducted to assess the oral health status and treatment needs of police personnel employed in police stations of ...

  19. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  20. Dosimetry of the Occupational Exposure Personnel and not exposure of the INNSZ

    International Nuclear Information System (INIS)

    Ruiz J, A.

    1999-01-01

    In this work, was measured the equivalent dose of all the personnel of Nuclear medicine and personnel of the Institute which by its activities remain in the Department, by time determined, through thermoluminescent dosemeters and the results were that the personnel presents variable equivalent dose and it is proportional to the time and radionuclide type which use for their work. By this it is allowed to secure what the work watched with respect to radiological protection to fulfil with the International Standards standing for personnel in the Institute. (Author)

  1. Forecasting the Demand for Information Security Personnel

    Directory of Open Access Journals (Sweden)

    Anatoliy Alexandrovich Malyuk

    2016-06-01

    Full Text Available During the formation of information society the problem of determining the demand for IS personnel (DfISP, consisting of IS specialists and IS practitioners, is of particular relevance at present. The goal of the paper is to calculate the demand for IS specialists (DfISS. To achieve it we used the informal heuristic methods and introduced some important indicators for DfISP forecast. As a validation of the conceptual approach proposed we show how to apply it on the regional level of one country on one real-world example. All the reasoning and calculations can be narrowed down to the DfISS forecasting within one corporation or IS professionals of a specific profile.

  2. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  3. Evaluation of Agency's Public Personnel Administration

    OpenAIRE

    Neal W. Tamayo

    2017-01-01

    As a consultant for a government agency, this paper will design recommendations and improvements for the agency’s public personnel administration. In order to do this, the consultant has to become familiar with the agency, its departments and also understand the key factors. The department chosen from the government for this paper is the Social Security Administration (Kestenbaum, 2014).

  4. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  5. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  6. A personnel TLD system with person identification

    International Nuclear Information System (INIS)

    Widell, C.O.

    1974-01-01

    The TLD system uses Li 2 B 4 O 7 :Mn, Si sintered tablets which are heated by hot nitrogen. The slide which holds the tablets is coded by a self adhesive polyester-aluminium tape. This tape is BCD coded in an ordinary tape punch. The information on the punched tape includes a ten digit social-security number and a two digit information on location and type of dosimetry. By this system dosimetric data is directly transfered into a central dose register for Sweden. All personnel doses are there stored on social-security numbers. (author)

  7. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  8. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  9. The European Union’s Aviation Security Mission in South Sudan

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Rodt, Annemarie Peen

    of the security situation in the country, all EU personnel were evacuated in January 2014, and the mission was (informally) terminated after fulfilling its mandated deployment period. Even though the mission had succeeded in training 350 personnel prior to the evacuation, its contribution to the overall security......When South Sudan gained independence in 2011, the new country needed assistance from external actors during the transition to prevent the security situation from deteriorating. In 2012 the EU launched its Aviation Security Mission (EUAVSEC) in South Sudan as part of its Common Security and Defence...... Policy. This came in response to a South Sudanese request for EU support and assistance in strengthening the security in Juba International Airport, as it had proven difficult for South Sudan to establish a fully operational transport hub. The EU estimated that an improvement of the airport security...

  10. Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training.

    Science.gov (United States)

    de Gramatica, Martina; Massacci, Fabio; Shim, Woohyun; Turhan, Uğur; Williams, Julian

    2017-02-01

    We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi-structured interviews. Our model extends previous principal-agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high-risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives. © 2016 Society for Risk Analysis.

  11. The laser Megajoule facility personnel security and safety interlocks

    International Nuclear Information System (INIS)

    Chapuis, J.C.; Arnoul, J.P.; Hurst, A.; Manson, M.

    2012-01-01

    The LMJ (Laser Megajoule) is designed to deliver about 1.4 MJ of 0.35 μm light to targets for high energy density physics experiments. Such an installation entails specific hazards related to the presence of intense laser beams, and high voltage power laser amplifiers. Furthermore, the thermonuclear fusion reactions induced by the experiment also produce different radiations and neutrons burst, and also activate various materials in the chamber environment. All these hazards could be lethal. The SSP (Personnel Safety System) was designed to prevent accidents and protect personnel working in the LMJ. To satisfy at the lowest cost the requirements of safety regulations and those of the operation management, the choice was made to implement a functional architecture built around two independent technological barriers when required by the risk level. Each technical barrier is composed of two subsets, one dedicated to hazard sources management, and the other one dedicated to worker presence management. The two completely independent barriers, even at the sensor or actuator level, are designed with different technologies adapted to the required Safety Integrity Level. The combination of these 2 barriers is equivalent to a unique barrier with a rate of dangerous failure of about 10 -6 per year

  12. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  13. Study on Maintenance Personnel Development Plan For The Exported APR1400 Commissioning

    International Nuclear Information System (INIS)

    Cho, Sungbae; Kim, Jongdae; Jun, Hokwang; Hwang, Inok; Kang, Jaeyuel

    2012-01-01

    This paper indicates ways to develop maintenance personnel for the exported APR1400 commissioning. The exported APR1400 has not been experienced ay maintenance yet, and requirements for maintenance personnel have not been clarified yet. Based on sound maintenance experience, KEPCO Plant Service and Engineering Company (KEPCO KPS) has studied on maintenance training and career requirement to establish a development plan of the maintenance personnel for the exported nuclear power plant. By defining manpower and training requirement, and mobilization plan, we expect to secure reliability of the exported APR1400

  14. Method to control the persons permitted to enter plants with increased security requirements and personnel lock for such plants

    International Nuclear Information System (INIS)

    Blaser, E.; Eickhoff, H.; Tretschoks, W.

    1978-01-01

    The personnel lock for a plant with increased security requirements, e.g. a nuclear power plant, has got two lock gates. Only persons whose right to enter has been established by the control equipment will be admitted to the lock chamber. For this purpose an identification recess is built in front of the first access to the lock chamber, where size, weight and the contours of the persons wanting to enter are roughly measured and compared with a code card carried along. The weight is established by a balance forming part of the base of the recess. By means of contact surfaces in the region of knees, upper thigh, chest and shoulder an upright position of the person is guaranteed. Scanning of the physical dimensions is performed with laser, infrared and light barriers. (DG) [de

  15. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  16. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  17. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  18. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  19. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  20. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  1. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  2. Personnel Risks in Ensuring Safety of Medical Activity

    Directory of Open Access Journals (Sweden)

    O. L. Zadvornaya

    2017-01-01

    Full Text Available Purpose: modern strategies of management of the organization require the formation of special management approaches based on the analysis of the mechanisms and processes of the organization of medical activities related to possible risks in activity of medical personnel. Based on international experience and own research the authors have identified features of a system of management of personnel risk in medical activities, examined approaches showing the sequence and contents of the main practical activities of the formation, maintenance and development of the system of management of personnel risks. Emphasized is the need for further research and implementation of the system of management of personnel risk in health care organizations. Study and assessment of personnel risks affecting the security of medical activities aimed at the development of the system of personnel risk management, development of a system of identification and monitoring of HR risk indicators with a purpose to improve institutional management and increase efficiency of activity of medical organizations. Methods: in the present study, the following methods were used: systemic approach, content analysis, methods of social diagnosis (questionnaires, interviews, comparative analysis, method of expert evaluations, method of statistical processing of information. Results: approaches to predict the occurrence and development of personnel risks have been reviewed and proposed. Conclusions and Relevance: patient safety is a global issue affecting countries at all levels of development. Each year, the WHO identifies a number of systemic and technical aspects and trends in the field of patient safety related to actions of medical workers. Existing imbalances in the staffing of the health system of the Russian Federation increase the probability of potential risks in medical practice. The personnel policy of healthcare of the Russian Federation requires further improvement and

  3. 78 FR 37244 - Submission for Review: We Need Important Information About Your Eligibility for Social Security...

    Science.gov (United States)

    2013-06-20

    ... Important Information About Your Eligibility for Social Security Disability Benefits, RI 98-7. As required... Personnel Management. Title: We Need Important Information About Your Eligibility for Social Security... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need Important Information About Your...

  4. FAA computer security : concerns remain due to personnel and other continuing weaknesses

    Science.gov (United States)

    2000-08-01

    FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...

  5. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  6. Security in the nuclear medicine department

    International Nuclear Information System (INIS)

    Bassingham, S.; Gane, J.; Chan, P.S.; Heenan, S.; Gulliver, N.; McVey, J.

    2005-01-01

    The current threat from terrorism highlights the need for awareness of adequate security of radioactive sources by health bodies to prevent the opportunistic access to, theft of. or accidental loss of sources, together with stringent security measures in place to prevent the international misuse of radioactive sources as a weapon by unauthorised access. This presentation discusses the processes undertaken to ensure the safety and security of radioactive materials within the nuclear medicine department in line with current regulations and guidelines. These include risk assessments, security systems, audit trails, restricted access and personnel background checks

  7. Privacy Act System of Records: EPA Personnel Emergency Contact Files, EPA-44

    Science.gov (United States)

    Learn about the EPA Personnel Emergency Contact Files System, including including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedure.

  8. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  9. A guide for developing an ADP security plan for Navy Finance Center, Cleveland, Ohio

    OpenAIRE

    Barber, Daniel E.; Hodnett, Elwood Thomas, Jr.

    1982-01-01

    Approved for public release; distribution is unlimited This paper is intended to be used as a guide by personnel at the Navy Finance Center (NFC) Cleveland, Ohio in developing an Automatic Data Processing (ADP) Security Plan. An effort has been made to combine the requirements for an ADP security plan established by OPNAVINST5239.1A with pertinent information from other selected readings. The importance of the devotion of personnel, time and funds to ADP security planning has been emphas...

  10. 77 FR 11142 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-02-24

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0133] Merchant Marine Personnel... at the Hilton San Francisco Airport Bayfront Hotel, 600 Airport Blvd., Burlingame, CA 94010. For..., we are inviting public comment on the issues to be considered by the working group, which are listed...

  11. 77 FR 65570 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-10-29

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0968] Merchant Marine Personnel... hotel facilities or services for individuals with disabilities or to request special assistance, contact... comment on the issues to be considered by the work group, which are listed in the ``Agenda'' section below...

  12. 32 CFR Appendix E to Part 154 - Personnel Security Determination Authorities

    Science.gov (United States)

    2010-07-01

    ... designee 5. Chairman, Joint Chiefs of Staff and/or designee 6. Directors of the Defense Agencies and/or... personnel for assignment to Presidential Support activities: The Executive Secretary to the Secretary and... of Strategic Target Planning 2. Director, Joint Staff, OJCS 3. Chief of Staff, U.S. Army 4. Chief of...

  13. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG--014 Military Pay and Personnel System... Security U.S. Coast Guard--014 Military Pay and Personnel System of Records.'' This system of records allows the Department of Homeland Security U.S. Coast Guard to collect and maintain records regarding pay...

  14. Development of an integrated campus security alerting system ...

    African Journals Online (AJOL)

    This work presents an integrated alerting system which uses both the Internet Protocol (IP) cameras and micro-switches for monitoring security situations thereby providing an immediate alerting signal to the security personnel. The system has the input unit, processing unit, control unit and the power supply unit as its ...

  15. A novel wireless local positioning system for airport (indoor) security

    Science.gov (United States)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  16. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  17. The Politics of Security Deployment of Security Operatives to Jos Metropolis, Plateau State, Nigeria 2001-2014

    Directory of Open Access Journals (Sweden)

    Dantani Umar

    2017-01-01

    Full Text Available The paper examines the politics of security deployment by the Federal Government of Nigeria to Jos, metropolis. A cross-sectional study was conducted and Public Opinion Theory adopted. Methodologically, mixed methods of data collection were conducted that involved the administration of 377 questionnaires to adult respondents, six In-Depth Interviews with religious and community leaders while three Key Informant Interviews with security personnel working with Special Task Force. The survey reveals that, the deployment of Mobile Police from 2001-2010 and the formation of Special Task Force in 2010 has generated mixed reactions and divergent perceptions among the residents of Jos metropolis. Majority of the ethnic groups that are predominantly Christians were more contented with the deployment of the Mobile Police whereas ethnic groups that are dominantly Muslims questioned the neutrality, capability, performance and strength of the Nigerian Police Force in managing the crises. The study recommends that, security personnel should display high degree of neutrality in order to earn the confidence of the residents and change their perceptions.

  18. The remote security station (RSS)

    International Nuclear Information System (INIS)

    Pletta, J.B.

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform

  19. Manpower, Personnel, and Training Assessment (MPTA) Handbook

    Science.gov (United States)

    2015-11-01

    programs. 8. Target Audience Description ( TAD ) The TAD is the initial description of the number and type of personnel required to operate, maintain...requirements, etc.) describing the Soldiers operating or maintaining the system. In cases where operating a system requires a security clearance, the TAD ...Authority. Milestone Decision Authority Target Audience Description ( TAD ) AR 602-2 AR 611-1 DA Pam 611-21 X X X X X X The TAD lists

  20. 32 CFR 552.109 - Routine security controls.

    Science.gov (United States)

    2010-07-01

    ..., dependent, or DoD civilian identification cards are authorized unimpeded access to Fort Lewis during periods... who desire to visit unit areas, club facilities and other recreational facilities, security personnel...

  1. Nuclear security culture: a generic model for universal application

    International Nuclear Information System (INIS)

    Khripunov, I.

    2005-01-01

    Full text: Nuclear security culture found its way into professional parlance several years ago, but still lacks an agreed-upon definition and description. The February 2005 U.S.-Russian Joint Statement, issued at the presidential summit meeting in Bratislava, referred specifically to security culture, focusing renewed attention on the concept. Numerous speakers at the March 2005 International Atomic Energy Agency's (IAEA) international conference on nuclear security referred to security culture, but their visions and interpretations were often at odds with one another. Clearly, there is a need for a generic model of nuclear security culture with universal applicability. Internationally acceptable standards in this area would be invaluable for evaluation, comparison, cooperation, and assistance. They would also help international bodies better manage their relations with the nuclear sectors in various countries. This paper will develop such a model. It will use the IAEA definition of nuclear security, and then apply Edgar Schein's model of organizational culture to security culture at a generic nuclear facility. A cultural approach to physical protection involves determining what attitudes and beliefs need to be established in an organization, how these attitudes and beliefs manifest themselves in the behavior of assigned personnel, and how desirable attitudes and beliefs can be transcribed into formal working methods to produce good outcomes, i.e., effective protection. The security-culture mechanism I will propose is broken into four major units: facility leadership, proactive policies and procedures, personnel performance, and learning and professional improvement. The paper will amplify on the specific traits characteristic of each of these units. Security culture is not a panacea. In a time of mounting terrorist threats, it should nonetheless be looked upon as a necessary organizational tool that enhances the skills of nuclear personnel and ensures that

  2. The WINS Academy Security Certification Programme: The Route to Demonstrable Competence

    International Nuclear Information System (INIS)

    Howsley, Roger

    2014-01-01

    Key Messages: The Nuclear Sector is a long way behind other sectors in certifying personnel with security accountabilities as being competent; We need to do something about it urgently; Attending security awareness courses is simply not enough

  3. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  4. Technical obstacles to nuclear security - Russian perspective

    International Nuclear Information System (INIS)

    Pshakin, G.

    2005-01-01

    Full text: Present political, economical and social development the world - wide and in particular countries and regions facilitate number of serious and dangerous challenges for people responsible for security of materials and facilities, which could be used as a threat to the humankind in case of unauthorized approach. A number of factors have impact on the security including political, social, financial and technical nature. The security of nuclear materials and facilities where nuclear materials located and under processing is facing a number of problems such as control of the personnel who is handling the materials, access to the materials and the facilities, accounting and control of the materials storage, transportation, transactions, processing, physical protection of the materials. Each aspect of those problems must be taken into account for establishing most efficient way to keep the nuclear materials out of hands of the terrorists. Technical aspects which require serious and intent relation from political and technical communities in Russia (as example) are the following: legal base for nuclear materials protection, control and accounting and export control; personnel for nuclear materials control and accounting - skill, reliability, responsibility, training and new generation education; personnel for physical protection - skill, reliability, responsibility, training; structure of the system and equipment for materials control, verification, accountability; structure of the system and equipment for physical protection; regulatory supervision of the MPC+A system effectiveness. (author)

  5. 10 CFR Appendix B to Part 73 - General Criteria for Security Personnel

    Science.gov (United States)

    2010-01-01

    .... Fixed site. B. Transportation. VI. Nuclear Power Reactor Training and Qualification Plan for Personnel.... Definitions Introduction Applicants and power reactor licensees subject to the requirements of § 73.55 shall... licensee to investigate into or judge the reading habits, political or religious beliefs, or attitudes on...

  6. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  7. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  8. Zero based programming: a viable security budgeting approach.

    Science.gov (United States)

    Roll, Frederick G

    2003-01-01

    To get additional dollars or avoid budget cuts or personnel reductions, healthcare security directors should consider a budget approach that best justifies the needs of the department or organization.

  9. Authorization gives the personnel he/she gives the center he/she gives Isotopes for the acting he/she gives tied functions with the security and the radiological protection

    International Nuclear Information System (INIS)

    Perez Pijuan, S.; Hernandez Alvarez, R.; Peres Reyes, Y.; Venegas Bernal, M.C.

    1998-01-01

    The conception is described used in a center production labelled compound and radiopharmaceuticals for the authorization to the support, operation and supervision personnel The approaches are exposed used to define the excellent positions for the security the installation. The are described the training programs, designed starting from the indentification the specific competitions for each duty station and with particular emphasis in the development gives abilities you practice. It is used for the administration and evaluation gives the programs training the Automated System Administration Programs Training (GESAT)

  10. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological contract in our...... sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a psychological...

  11. A performance evaluation of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.; Wright, L.J.

    1987-01-01

    Personnel identity verification devices, which are based on the examination and assessment of a body feature or a unique repeatable personal action, are steadily improving. These biometric devices are becoming more practical with respect to accuracy, speed, user compatibility, reliability and cost, but more development is necessary to satisfy the varied and sometimes ill-defined future requirements of the security industry. In an attempt to maintain an awareness of the availability and the capabilities of identity verifiers for the DOE security community, Sandia Laboratories continues to comparatively evaluate the capabilities and improvements of developing devices. An evaluation of several recently available verifiers is discussed in this paper. Operating environments and procedures more typical of physical access control use can reveal performance substantially different from the basic laboratory tests

  12. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  13. ILO Policy Guidelines on the promotion of decent work for early childhood education personnel

    OpenAIRE

    ILO International Labour Office

    2014-01-01

    These Guidelines set out principles for the promotion of decent work for early childhood education (ECE) personnel as a means of ensuring universal access to high-quality ECE services. In this respect they cover conditions of work and employment of ECE personnel and related issues, including ECE financing, curricula and learning practices, social security, professional ethics and ECE governance systems. The Guidelines are meant to serve as a reference tool on principles that should be reflect...

  14. Task team approach to safeguards and security designs

    International Nuclear Information System (INIS)

    Zack, N.R.; Wilkey, D.D.

    1991-01-01

    In 1987, a U.S. department of Energy (DOE) supported task team was organized at the request of the DOE Idaho Field Office (DOE-ID) to provide support for safeguards and security (S and S) designs of the Special Isotope Separation (SIS) facility. Prior to deferral of the project, the SIS facility was to be constructed at the Idaho National Engineering Laboratory (INEL) to produce weapons grade plutonium from DOE owned fuel grade plutonium. The task team was assembled to provide the resources necessary to assure that S and S considerations were included as an integral part of the design of the facility, and that SIS designs would take advantage of available technology in the areas of physical security, measurements, accountability, and material and personnel tracking. The task team included personnel from DOE/Office of Safeguards and Security (DOE-OSS), DOE-ID, DOE contractors, and the national laboratories providing a wide range of expertise and experience. This paper reports that the team reviewed proposed designs and provided recommendations for safeguards and security features in each stage of the design process. The value of this approach to safeguards and security designs will be discussed with respect to benefits, lessons learned, and recommendations for future applications

  15. Lethal stakes: rig-hand killings show rising security risks abroad

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  16. Lethal stakes: rig-hand killings show rising security risks abroad

    International Nuclear Information System (INIS)

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  17. development of an integrated campus security alerting system

    African Journals Online (AJOL)

    user

    Keywords: Campus Security, Microcontroller, Internet Protocol Camera, Integrated system, Micro-switches. 1. INTRODUCTION .... personnel can fall back to the information captured/stored ...... Adetoba A. O. "Design and Construction of a Car.

  18. Towards a new approach to the labour law applicable to contractors’ personnel

    CERN Multimedia

    Corinne Pralavorio

    2010-01-01

    On 18 October, CERN and its two Host States will sign agreements on the labour law applicable to the personnel of contractors operating on the CERN site. Once they have entered into force, the agreements will facilitate execution of service contracts for both firms and CERN, and will provide the personnel concerned with better security and more stability.   On 18 October 2010, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. A site that straddles the French-Swiss border makes CERN unique among international organizations. Although this unique characteristic is a fine symbol of international collaboration, it also entails some legal and administrative difficulties. On 18 October, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. This agreement will be supplemented by a bilateral agreement between France and Switzerland amending the 1...

  19. 76 FR 63811 - Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and...

    Science.gov (United States)

    2011-10-13

    ... implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and... policies and minimum standards will address all agencies that operate or access classified computer...

  20. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-01-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur

  1. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-07-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur. 2 refs

  2. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  3. A review of video security training and assessment-systems and their applications

    International Nuclear Information System (INIS)

    Cellucci, J.; Hall, R.J.

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups

  4. Drug Use and Abuse: Background Information for Security Personnel

    Science.gov (United States)

    1994-05-01

    Neurotoxicity of methamphetamine : Mechanisms of action and issues related to aging. In Miller, M. A., & Kozel, N. J., (Eds.), op. cit. 99. Cox et al...lives. This presents a dilemma for clearance adjudicators. If clearance standards are too lax, security may not be protected . If standards are too...strict, many well-adjusted, adventuresome, and creative employees may be screened out. Drug use may weaken judgment and affect ability to protect

  5. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  6. 76 FR 39887 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Science.gov (United States)

    2011-07-07

    ... Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... the site visit, TSA personnel complete the CSR form, which asks security-related questions. This...

  7. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  8. Face recognition in securing optical telecom network equipment

    International Nuclear Information System (INIS)

    Ali, N.M.

    2015-01-01

    In this paper, face recognition is used with a microcontroller based hardware module to secure the telecommunication equipments like ONU (optical network units) or any other telecommunication equipment. The face recognition classifier value optimization adaption is deployed and in this scheme by increasing or decreasing the number of images in the database will automatically generate and adopt the classifier value for recognition of known and unknown persons. On recognizing and unknown persons. On recognizing an unknown person, the hardware module will send an SMS to the concerned security personnel for security preventive measures. (author)

  9. Military personnel recognition system using texture, colour, and SURF features

    Science.gov (United States)

    Irhebhude, Martins E.; Edirisinghe, Eran A.

    2014-06-01

    This paper presents an automatic, machine vision based, military personnel identification and classification system. Classification is done using a Support Vector Machine (SVM) on sets of Army, Air Force and Navy camouflage uniform personnel datasets. In the proposed system, the arm of service of personnel is recognised by the camouflage of a persons uniform, type of cap and the type of badge/logo. The detailed analysis done include; camouflage cap and plain cap differentiation using gray level co-occurrence matrix (GLCM) texture feature; classification on Army, Air Force and Navy camouflaged uniforms using GLCM texture and colour histogram bin features; plain cap badge classification into Army, Air Force and Navy using Speed Up Robust Feature (SURF). The proposed method recognised camouflage personnel arm of service on sets of data retrieved from google images and selected military websites. Correlation-based Feature Selection (CFS) was used to improve recognition and reduce dimensionality, thereby speeding the classification process. With this method success rates recorded during the analysis include 93.8% for camouflage appearance category, 100%, 90% and 100% rates of plain cap and camouflage cap categories for Army, Air Force and Navy categories, respectively. Accurate recognition was recorded using SURF for the plain cap badge category. Substantial analysis has been carried out and results prove that the proposed method can correctly classify military personnel into various arms of service. We show that the proposed method can be integrated into a face recognition system, which will recognise personnel in addition to determining the arm of service which the personnel belong. Such a system can be used to enhance the security of a military base or facility.

  10. DOD PERSONNEL CLEARANCES: Additional OMB Actions Are Needed to Improve the Security Clearance Process

    National Research Council Canada - National Science Library

    2006-01-01

    Our independent analysis of timeliness data showed that industry personnel contracted to work for the federal government waited more than one year on average to receive top secret clearances, longer...

  11. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  12. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  13. Understanding the security management practices of humanitarian organizations.

    Science.gov (United States)

    Bollettino, Vincenzo

    2008-06-01

    Humanitarian organisations operate in increasingly hostile environments. Although authoritative statistics are scarce, anecdotal evidence suggests that aid workers face life-threatening risks that are exacerbated by the growing number of humanitarian organisations operating in the field, the diversity of their mandates, the lack of common professional security standards, and limited success in inter-agency security coordination. Despite broad acceptance of the need for better security management and coordination, many humanitarian organisations remain ambivalent about devoting increased resources to security management and security coordination. A critical lack of basic empirical knowledge of the field security environment hampers efforts to enhance security management practices. The absence of a systematic means of sharing incident data undermines the capacity of the humanitarian community to address proactively security threats. In discussions about humanitarian staff safety and security, the least common denominator remains cumulative anecdotal evidence provided by the many security personnel working for humanitarian organisations in the feld.

  14. Special feature article-very urgent nuclear energy personnel training

    International Nuclear Information System (INIS)

    Saito, Shinzo; Tsujikura, Yonezo; Kawahara, Akira

    2007-01-01

    Securing human resources is important for the sustainable development of research, development and utilization of nuclear energy. However, concerns have been raised over the maintenance of human resources due to the decline of public and private investment in research and development of nuclear energy in recent years. To that end, it is essential for the workplace in the field of nuclear energy to be engaging. This special feature article introduced the Government's fund program supporting universities and vocational colleges to develop human resources in the area of nuclear energy. Electric utilities, nuclear industries, nuclear safety regulators and related academia presented respective present status and issues of nuclear energy personnel training with some expectations to the program to secure human resources with professional qualifications. (T. Tanaka)

  15. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  16. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge...) Methods of physical screening of persons, personal effects, baggage, cargo, and vessel stores; and (m) The...

  17. Analysis of health professional security behaviors in a real clinical setting: an empirical study.

    Science.gov (United States)

    Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis

    2015-06-01

    The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. Personnel monitoring

    International Nuclear Information System (INIS)

    1965-01-01

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  19. Personnel monitoring

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1966-12-31

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  20. Pakistan’s national Centre of Excellence contributes to sustaining nuclear security

    International Nuclear Information System (INIS)

    Dixit, Aabha

    2016-01-01

    Pakistani front line officers and first responders are in a better position to fight illicit trafficking in nuclear and other radioactive materials, as well as to use advanced radiation detection and monitoring equipment, thanks to training they have received at the country’s Centre of Excellence for Nuclear Security. This is just one of the benefits the country has reaped from the Centre, which is collaborating with the growing International Network for Nuclear Security Training and Support Centres (NSSC Network), building national capacity through training and strengthening technical and scientific support programmes. Since the establishment of the Centre of Excellence, Pakistan has organized training courses on nuclear security for personnel from national and regional organizations. The Centre of Excellence also offers technical support to personnel involved in the maintenance and upgrade of facilities, with a focus on enhancing technical and scientific skills and quality control of equipment.

  1. The security system of nuclear installations and its impact on labour law

    International Nuclear Information System (INIS)

    Daeubler, W.

    1984-01-01

    'Hazardous technologies', in particular nuclear technology, are a challenge to labour law because in these branches of industry, selection of personnel and employment conditions are completely governed by government regulations, and codetermination rights often are neutralized due to security regulations. The author investigates ways and means of reconciling the interests of security provisions on the one hand, and of codetermination rights on the other. The crucial points in this context are inevitable measures such as security screening of personnel, surveillance and physical protection measures, secrecy protection. The author discusses the difficult issue of whether there are possibilities to off-set the curtailments of the right of codetermination by new ways and means of participation by employees which ought to be offered on a higher level, i.e. on the authorities level rather than on the level of industrial plants. (HSCH) [de

  2. Evaluation of the nuclear security culture

    International Nuclear Information System (INIS)

    Spitalnik, Jorge

    2003-01-01

    The security culture of an organization resides in its workers and it is expressed by the way the personnel that works in a particular organization practice daily its activities. The security culture can be practice in a high or in a low level, but it always exists and it can always be improved. It is based on the security condition and procedures that have been established in the planning phase and in the implementation of a project. After its implantation, in order to avoid deterioration, basically it is necessary to maintain and to bring updated those conditions and procedures through strategies of follow up and control. This process establishes the basis of a program of maintenance and improvement of the Security Culture. Many self-evaluations that have been accomplished at nuclear organizations based on workers perception concerning working conditions and management environment, have permitted objectively determine if the security doctrine, which the organization assure to follow rigorously into its dally activities, is really so (LS)

  3. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  4. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  5. An Investigation of Social Factors Affecting on Personnel Job Satisfaction of Remedial Service Insurance Department

    Directory of Open Access Journals (Sweden)

    Sayyed Yaser Ebrahimian Jolodar

    2012-01-01

    Full Text Available Because of the paramount importance of job satisfaction and due to its main consequences such as reduction of work absence and resignation, personnel promotion and society‟s health, and more importantly, its role in achievement of organization goals, this study aimed at investigating the effects of six social factors including personnel‟s belief, salary and benefits, participation in organizational decision-making, sense of job security, interaction with colleagues and meeting the basic needs of personnel on job satisfaction. The statistical population of this study was the personnel of Remedial Service Insurance Department in Sari and the questionnaire was distributed among them. The results showed that there is a significant and positive correlation among all these factors and they have meaningful effects on personnel job satisfaction based on multiple regression analysis. Furthermore, findings revealed that personnel‟s belief about their job has the most effects on job satisfaction.

  6. Remodeling Strategic Staff Safety and Security Risks Management in Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Sunday S. AKPAN

    2015-10-01

    Full Text Available This paper examined safety and security risk management in tertiary institutions in Nigeria. The frequent attacks at workplace, especially schools, have placed safety and security in the front burner of discussion in both business and political circles. This therefore, forms the imperative for the conduct of this study. The work adopted a cross sectional survey research design and collected data from respondents who are security personnel of the University of Uyo. Analysis of data was done with simple percentage statistics while the research hypotheses were tested with mean and simple regression and correlation statistics. The findings of the study revealed that assassination, kidnappings and bombings were principal risk incidents threatening the safety and security of staff in University of Uyo. A significant positive relationship was found between the funding of security management and workers’ performance. It was discovered specifically that employment screening, regular training of security personnel, regular safety and security meetings and strategic security policy formation were the main strategies for managing safety and security in University of Uyo. The paper concluded that safety and security management and control involves every worker (management and staff of University of Uyo. It was recommended, among others, that management should be more committed to safety and security management in the University by means of making safety and security issues an integral part of University’s strategic plan and also by adopting the management line model – one form of management structure-where safety and security are located, with other general management responsibilities. This way, the resurgent cases of kidnapping, hired assassination, etc. would be reduced if not completely eradicated in the University.

  7. Dosimetry of the Occupational Exposure Personnel and not exposure of the INNSZ; Dosimetria del Personal Ocupacionalmente Expuesto (POE) y no expuesto del INNSZ

    Energy Technology Data Exchange (ETDEWEB)

    Ruiz J, A [Departamento de Medicina Nuclear, Instituto nacional de la nutricion Salvador Zubiran, Mexico D.F. C.P. 14100 (Mexico)

    1999-07-01

    In this work, was measured the equivalent dose of all the personnel of Nuclear medicine and personnel of the Institute which by its activities remain in the Department, by time determined, through thermoluminescent dosemeters and the results were that the personnel presents variable equivalent dose and it is proportional to the time and radionuclide type which use for their work. By this it is allowed to secure what the work watched with respect to radiological protection to fulfil with the International Standards standing for personnel in the Institute. (Author)

  8. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  9. Theoretical foundations of information security investment security companies

    Directory of Open Access Journals (Sweden)

    G.V. Berlyak

    2015-03-01

    Full Text Available Methodological problems related to the lack of guidance in the provisions (standards of accounting on the reflection in the accounting and financial reporting of the research object. In this connection, it is proposed to amend the provisions (standards of accounting. This will allow to come to the consistency of accounting methods of operations with elements of investment activity. Based on analysis of the information needs of users suggested indicators identikativnye blocks (block corporate finance unit assess the relationship with financial institutions, block the fulfillment of obligations according to the calculations, the investment unit, a science and innovation, investment security and developed forms of internal accounting controls and improvements to existing forms financial statements for the investment activities of the enterprise. Using enterprise data reporting forms provide timely and reliable information on the identity and structure of investment security and enable the company to effectively plan and develop personnel policies for enterprise management.

  10. Personnel Selection Method Based on Personnel-Job Matching

    OpenAIRE

    Li Wang; Xilin Hou; Lili Zhang

    2013-01-01

    The existing personnel selection decisions in practice are based on the evaluation of job seeker's human capital, and it may be difficult to make personnel-job matching and make each party satisfy. Therefore, this paper puts forward a new personnel selection method by consideration of bilateral matching. Starting from the employment thoughts of ¡°satisfy¡±, the satisfaction evaluation indicator system of each party are constructed. The multi-objective optimization model is given according to ...

  11. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  12. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  13. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  14. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Science.gov (United States)

    2012-07-23

    ... expatriate security company (the source is 32 CFR 159.3, section (3) of the definition of ``covered contract.... Such firms are, by definition, not small businesses because they are not U.S. firms. In the small... unpredictable high-threat environment where personnel performing security functions may be called upon to use...

  15. Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat

    Science.gov (United States)

    2016-06-10

    personnel, outside of military police and DoD-contracted civilian LE, to provide an additional layer of security in the workplace . Augmented security does...Research, context, and conclusions from this study may prove that seemingly riskier, yet more secure; measures exist to further empower installation...commanders with safeguarding DoD men and women from active shooter attacks. Conclusion DoD leadership and commanders at all levels have the

  16. Safeguarding cultural properties security for museums, libraries, parks, and zoos

    CERN Document Server

    Layne, Stevan P

    2014-01-01

    Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic s

  17. Equipment for radiography in Yugoslavia - security and radiation protection

    International Nuclear Information System (INIS)

    Dobrijevic, R.; Vucina, J.

    1998-01-01

    Nondestructive method of material control by using radioisotopes is developed in Yugoslavia. This method of quality control is professionally performed by 30 firms. This paper presents the overview of the equipment used in the industrial radiography by using radioisotopes. Special attention was devoted to the security during the work and to the radiation protection of the operator and other personnel around the working place. In general it could be concluded that the main drawback which influences the security is the fact that most cases old and whom out equipment is in use. Other factors influencing the security are also discussed. (author)

  18. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    National Research Council Canada - National Science Library

    Elsea, Jennifer K; Schwartz, Moshe; Nakamura, Kennon H

    2008-01-01

    .... In Iraq, private firms known as Private Security Contractors (PSCs) serve to protect individuals, transport convoys, forward operating bases, buildings, and other economic infrastructure, and are training Iraqi police and military personnel...

  19. 32 CFR 154.8 - Types and scope of personnel security investigations.

    Science.gov (United States)

    2010-07-01

    ..., benefits, and privileges under Federal programs. Accordingly, personal interviews are an integral part of... forth in the following paragraphs of this section. (1) BI/PR. A personal interview shall be conducted by... security clearability, or be otherwise stigmatizing. (3) Hostage situation. A personal interview shall be...

  20. An analysis of generalised heuristics for vehicle routing and personnel rostering problems

    OpenAIRE

    Mustafa Misir; Pieter Smet; Greet Vanden Berghe

    2015-01-01

    The present study investigates the performance of heuristics while solving problems with routing and rostering characteristics. The target problems include scheduling and routing home care, security and maintenance personnel. In analysing the behaviour of the heuristics and determining the requirements for solving the aforementioned problems, the winning hyper-heuristic from the first International Cross-domain Heuristic Search Challenge (CHeSC 2011) is employed. The completely new applicatio...

  1. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  2. Safeguards through secure automated fabrication

    International Nuclear Information System (INIS)

    DeMerschman, A.W.; Carlson, R.L.

    1982-01-01

    Westinghouse Hanford Company, a prime contractor for the U.S. Department of Energy, is constructing the Secure Automated Fabrication (SAF) line for fabrication of mixed oxide breeder fuel pins. Fuel processing by automation, which provides a separation of personnel from fuel handling, will provide a means whereby advanced safeguards concepts will be introduced. Remote operations and the inter-tie between the process computer and the safeguards computer are discussed

  3. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as... security equipment and systems; (i) Inspection, control, and monitoring techniques; (j) Methods of physical...

  4. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  5. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  6. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  7. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  8. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  9. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  10. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  11. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of Management and... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  12. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Science.gov (United States)

    2013-01-16

    ... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  13. Personnel preferences in personnel planning and scheduling

    OpenAIRE

    van der Veen, Egbert

    2013-01-01

    Summary The personnel of an organization often has two conflicting goals. Individual employees like to have a good work-life balance, by having personal preferences taken into account, whereas there is also the common goal to work efficiently. By applying techniques and methods from Operations Research, a subfield of applied mathematics, we show that operational efficiency can be achieved while taking personnel preferences into account. In the design of optimization methods, we explicitly con...

  14. Contribution of Security Forces Personnel to Deter Migration and Improve Stability in West Africa

    Science.gov (United States)

    2017-06-09

    response, cybersecurity analyst, chemical facility inspector, and others.19 Limitations There are several limitations to this research. The time...basins and artificial lakes. This is one of the greatest achievements because agriculture represents one of the main economic activities of the...on intelligence to fill the gap in personnel. However, due to the level of poverty, human intelligence assets are the most preferred. Therefore, in

  15. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  16. Pakistan: Can the United States Secure an Insecure State?

    Science.gov (United States)

    2010-01-01

    do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure

  17. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  18. Neutron personnel dosimetry

    International Nuclear Information System (INIS)

    Griffith, R.V.

    1981-01-01

    The current state-of-the-art in neutron personnel dosimetry is reviewed. Topics covered include dosimetry needs and alternatives, current dosimetry approaches, personnel monitoring devices, calibration strategies, and future developments

  19. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  20. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  1. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  2. Transmission Line Security Monitor: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  3. Implementation of a personnel reliability program as a facilitator of biosafety and biosecurity culture in BSL-3 and BSL-4 laboratories.

    Science.gov (United States)

    Higgins, Jacki J; Weaver, Patrick; Fitch, J Patrick; Johnson, Barbara; Pearl, R Marene

    2013-06-01

    In late 2010, the National Biodefense Analysis and Countermeasures Center (NBACC) implemented a Personnel Reliability Program (PRP) with the goal of enabling active participation by its staff to drive and improve the biosafety and biosecurity culture at the organization. A philosophical keystone for accomplishment of NBACC's scientific mission is simultaneous excellence in operations and outreach. Its personnel reliability program builds on this approach to: (1) enable and support a culture of responsibility based on human performance principles, (2) maintain compliance with regulations, and (3) address the risk associated with the insider threat. Recently, the Code of Federal Regulations (CFR) governing use and possession of biological select agents and toxins (BSAT) was amended to require a pre-access suitability assessment and ongoing evaluation for staff accessing Tier 1 BSAT. These 2 new requirements are in addition to the already required Federal Bureau of Investigation (FBI) Security Risk Assessment (SRA). Two years prior to the release of these guidelines, NBACC developed its PRP to supplement the SRA requirement as a means to empower personnel and foster an operational environment where any and all work with BSAT is conducted in a safe, secure, and reliable manner.

  4. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Brown, C.H.

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs

  5. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Brown, C.H. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs.

  6. Causes and prevention of violence toward emergency personnel by patients and their relatives in a province in Turkey.

    Science.gov (United States)

    Cebeci, Fatma; Sucu, Gülten; Karazeybek, Ebru

    2009-03-23

    STUDY OBJECTIVE: This research was conducted to determine the opinions of the emergency department's personnel about the causes and prevention of violence directed at them by patients and their relatives. METHODS: This research was conducted between 3 February and 15 June, 2006, in Antalya, a province in southern Turkey, with a total of 216 emergency department personnel who work in the emergency departments of three hospitals. A questionnaire developed by researchers was used to collect data for the purpose of determining what kind of violence is directed at emergency personnel by patients and their relatives and the personnel's socio-demographic characteristics and opinions. Pearson's chi and Fisher's exact test were used in the analysis of the data. RESULTS: Almost all (94.4%) of the participating emergency personnel had been exposed to verbal violence and 59.7% to physical violence. Only 24.5% of those exposed to violence reported the violence. The majority of the personnel (72.5%) thought that individuals' personality tendencies are the primary cause of violence. Their primary recommendation for preventing violence was to increase security measures. Statistically significant differences were found between emergency personnel's place of work and physical violence, between gender and physical violence, and between level of education and reporting violence. CONCLUSION: On the basis of the research results, it is recommended that emergency personnel be trained on the subject of violence, a documentation system be developed for recording and reporting violence, and corrections be made to prevent violence based on the personnel's opinions.

  7. New fire and security rules change USA nuclear power plant emergency plans

    International Nuclear Information System (INIS)

    Garrou, A.L.

    1978-01-01

    New safety and security rules for nuclear power plants have resulted from the Energy Reorganisation Act and also from a review following the Browns Ferry fire. The content of the emergency plan which covers personnel, plant, site, as well as a general emergency, is outlined. New fire protection rules, the plan for security, local and state government assistance are also discussed, with a brief reference to the impact of the new rules on continuity of operations. (author)

  8. IBM mainframe security beyond the basics : a practical guide from a z/OS and RACF perspective

    CERN Document Server

    Dattani, Dinesh D

    2013-01-01

    Rather than rehashing basic information-such as command syntax-already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance, discussing the important issues in IBM mainframe security. Mainframes are the backbone of most large IT organizations; security cannot be left to chance. With very little training available to the younger crowd, and older, more experienced personnel retiring or close to retiring, there is a need in mainframe security skills at the senior level. Based on real-life experiences, issues, and soluti

  9. A passive automated personnel accountability system for reactor emergency preparedness

    International Nuclear Information System (INIS)

    Zimmerman, R.O.; DeLisle, G.V.; Hickey, E.E.

    1988-04-01

    In 1985 a project was undertaken at the N Reactor on the Hanford Site to develop an automated personnel accountability system to ensure accountability of all personnel within 30 minutes of a site evacuation. The decision to develop such a system was made after a full-scale evacuation drill showed that the manual accountability system in use at the time was inadequate to meet the 30-minute requirement. Accountability systems at commercial nuclear power plants were evaluated, but found to be unsuitable because they were not passive, that is, they required action on part of the user for the system to work. Approximately 2500 people could be required to evacuate the 100-N Area. Therefore, a card key system or badge exchange system was judged not to be feasible. A passive accountability system was desired for N Reactor to allow personnel to enter and leave the site in a more timely manner. To meet the need for an automated accountability system at N Reactor, a special Evacuation Accountability System (EVACS) was designed and developed. The EVACS system has three basic components: the transponder, a credit card-sized device worn with the security badge; portal monitors, which are electronically activated by the transponder; and a computer information system that contains the personnel data base. Each person wearing a transponder is accounted for automatically by walking through a portal. In this paper, a description of the hardware and software will be presented, together with problems encountered and lessons learned while adapting an existing technology to this particular use. The system is currently installed and requires acceptance testing before becoming operational

  10. Personnel Monitoring Department - DEMIN

    International Nuclear Information System (INIS)

    1989-01-01

    The activities and purposes of the Personnel Monitoring Dept. of the Institute of Radioprotection and Dosimetry of the Brazilian CNEN are presented. A summary of the personnel monitoring service is given, such as dosemeters supply, laboratorial inspections, and so on. The programs of working, publishing, courses and personnel interchange are also presented. (J.A.M.M.)

  11. Impacts of Psychological Science on National Security Agencies Post-9/11

    Science.gov (United States)

    Brandon, Susan E.

    2011-01-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of…

  12. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Science.gov (United States)

    2010-01-01

    ... knowledge. 1046.15 Section 1046.15 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF... knowledge. (a) DOE contractors shall only employ as protective force personnel individuals who successfully... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  13. Audit program for physical security systems at nuclear power plants

    International Nuclear Information System (INIS)

    Minichino, C.

    1982-01-01

    Licensees of nuclear power plants conduct audits of their physical security systems to meet the requirements of 10 CFR 73, Physical Protection of Plants and Materials. Section 73.55, Requirements for physical Protection of Licensed Activities in Nuclear Power Reactors Against Radiological Sabotage, requires that the security programs be reviewed at least every 12 months, that the audit be conducted by individuals independent of both security management and security supervision, and that the audit program review all aspects of the physical security system: hardware, personnel, and operational and maintenance procedures. This report contains information for the Nuclear Regulatory Commission (NRC) and for the licensees of nuclear power reactors who carry out these comprehensive audits. Guidance on the overall management of the audit function includes organizational structure and issues concerning the auditors who perform the review: qualifications, independence, due professional care, and standards. Guidance in the audit program includes purpose and scope of the audit, planning, techniques, post-audit procedures, reporting, and follow-up

  14. The Burden of Difference? School Welfare Personnel’s and Parents’ Views on Wellbeing of Migrant Children in Finland

    Directory of Open Access Journals (Sweden)

    Minna Säävälä

    2012-01-01

    Full Text Available The school welfare system faces a challenge in the linguistically and culturally diversifying school. This article examines how school welfare personnel, native language teachers, and migrant parents conceptualize the wellbeing of migrant children in Finland. The data analyzed by thematic content analysis consists of group and individual interviews of a total of 47 persons: nurses, psychologists, social workers, a headmaster, special education teachers, native language teachers, and migrant parents in the Helsinki metropolitan area. The school welfare professionals and migrant parents views stressed different factors as risks and resources of migrant childrens wellbeing. In school welfare personnels view, school wellbeing is secured by downplaying difference between children of diverse cultural backgrounds; moreover, they do not see negative attitudes, discrimination, or bullying of migrant children as a particular problem. Migrant parents and native language teachers in turn consider or at least fear their childrens wellbeing to be jeopardized by social exclusion, prejudice or discrimination. The school personnel find it difficult to recognize the power imbalance between minorities and the national majority that lies behind these different conceptualizations. This reduces trust and impedes the cooperation of migrant homes and school, particularly in situations when an intervention is imperative for securing child wellbeing.

  15. Systematic, appropriate, and cost-effective application of security technologies in U.S. public schools to reduce crime, violence, and drugs

    Science.gov (United States)

    Green, Mary W.

    1997-01-01

    As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.

  16. Personnel dose assignment practices

    International Nuclear Information System (INIS)

    Fix, J.J.

    1993-04-01

    Implementation of DOE N 5480.6 Radiological Control Manual Article 511(3) requirements, to minimize the assignment of personnel dosimeters, should be done only under a broader context ensuring that capabilities are in place to monitor and record personnel exposure both for compliance and for potential litigation. As noted in NCRP Report No. 114, personnel dosimetry programs are conducted to meet four major objectives: radiation safety program control and evaluation; regulatory compliance; epidemiological research; and litigation. A change to Article 511(3) is proposed that would require that minimizing the assignment of personnel dosimeters take place only following full evaluation of overall capabilities (e.g., access control, area dosimetry, etc.) to meet the NCRP objectives

  17. Qualification of NPP operations personnel

    International Nuclear Information System (INIS)

    Wang Jiao.

    1987-01-01

    Competence of personnel is one of the important problems for safety operation of nuclear power plant. This paper gives a description of some aspects, such as the administration of NPP, posts, competence of personnel, training, assessing the competence and personnel management

  18. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  19. 76 FR 49650 - Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or...

    Science.gov (United States)

    2011-08-11

    ... security services. Comment: Confusion about Geographic Combatant Commander Delegation Authority to... intelligence gathering and vetting is unclear Response: The Synchronized Pre-deployment and Operational Tracker... Afghanistan. SPOT is not used for intelligence gathering or vetting of personnel. Background checks of PSCs...

  20. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  1. Security, Violent Events, and Anticipated Surge Capabilities of Emergency Departments in Washington State

    Science.gov (United States)

    Weyand, Jonathan S.; Junck, Emily; Kang, Christopher S.; Heiner, Jason D.

    2017-01-01

    Introduction Over the past 15 years, violent threats and acts against hospital patients, staff, and providers have increased and escalated. The leading area for violence is the emergency department (ED) given its 24/7 operations, role in patient care, admissions gateway, and center for influxes during acute surge events. This investigation had three objectives: to assess the current security of Washington State EDs; to estimate the prevalence of and response to threats and violence in Washington State EDs; and to appraise the Washington State ED security capability to respond to acute influxes of patients, bystanders, and media during acute surge events. Methods A voluntary, blinded, 28-question Web-based survey developed by emergency physicians was electronically delivered to all 87 Washington State ED directors in January 2013. We evaluated responses by descriptive statistical analyses. Results Analyses occurred after 90% (78/87) of ED directors responded. Annual censuses of the EDs ranged from violent threats or acts occurring in their ED. Of these, 93% were directed towards nursing staff, 90% towards physicians, 74% towards security personnel, and 51% towards administrative personnel. Nearly half (48%) noted incidents directed towards another patient, and 50% towards a patient’s family or friend. These events were variably reported to the hospital administration. After an acute surge event, 35% believed the initial additional security response would not be adequate, with 26% reporting no additional security would be available within 15 minutes. Conclusion Our study reveals the variability of ED security staffing and a heterogeneity of capabilities throughout Washington State. These deficiencies and vulnerabilities highlight the need for other EDs and regional emergency preparedness planners to conduct their own readiness assessments. PMID:28435498

  2. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  3. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  4. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  5. The Financing and Personnel of the Lithuanian Army

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2015-12-01

    Full Text Available In 2014, at the beginning of the crisis in Ukraine and Russia‘s aggression against this neighboring country, Lithuania became concerned about the strengthening of its military capabilities, augmenting the National Defense System (NDS budget by almost 50% in two years. This may be considered unprecedented, if seen against the background of the presidential elections and those to the European Parliament, the fiscal discipline, the introduction of euro, as well as Russia‘s economic sanctions, the political decision in the course of 2014 on increasing the defense assignation by 130 million litas and in 2015 the increase by planned additional 356 million litas. This article analyzes two closely related problems of the Lithuanian NDS capabilities. First of all, changes in the NDS financing are explored in the context of permanent agreements of Lithuanian political parties concerning the allocation of 2% of the GDP for defense. This is followed by the discussion of the issues of military personnel staffing and training of the reserve as well as future challenges. This research contributes to the assessment of the critical NDS financing and staffing not only within academic circles but particularly among politicians and society in general. Additionally, it contributes to the awareness of the problems the army encountered in seeking to implement the objective set for it: to ensure the military security of the state. In the presence of the emerging threats in the region, this is of particularly great significance to the demilitarized and pacifist society of Lithuania. The article aims at identifying financing and personnel planning problems throughout a quarter of the century, ranging from the restoration of the Army of the Republic of Lithuania to 2014 inclusively. At the same time, the study encourages a discussion by the academic community on issues of the military security of the Lithuanian State and provides analyses as well as possible

  6. DOE Integrated Safeguards and Security (DISS) historical document archival and retrieval analysis, requirements and recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Guyer, H.B.; McChesney, C.A.

    1994-10-07

    The overall primary Objective of HDAR is to create a repository of historical personnel security documents and provide the functionality needed for archival and retrieval use by other software modules and application users of the DISS/ET system. The software product to be produced from this specification is the Historical Document Archival and Retrieval Subsystem The product will provide the functionality to capture, retrieve and manage documents currently contained in the personnel security folders in DOE Operations Offices vaults at various locations across the United States. The long-term plan for DISS/ET includes the requirement to allow for capture and storage of arbitrary, currently undefined, clearance-related documents that fall outside the scope of the ``cradle-to-grave`` electronic processing provided by DISS/ET. However, this requirement is not within the scope of the requirements specified in this document.

  7. 36 CFR 1202.90 - What NARA systems of records are exempt from release under the National Security Exemption of the...

    Science.gov (United States)

    2010-07-01

    ... of the Inspector General (NARA-23) and the Personnel Security Case Files (NARA-24) systems of records... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What NARA systems of records are exempt from release under the National Security Exemption of the Privacy Act? 1202.90 Section 1202...

  8. The Methodical Approach to Formation of the Economic-Social Provision of the Financial Security Management of Commercial Bank

    Directory of Open Access Journals (Sweden)

    Baryliuk Mariia-Mariana R.

    2017-06-01

    Full Text Available The article defines that the impact of threats on a commercial bank as an open socio-economic system results in losses that can be classified as financial, personnel, informational, and reputational. In terms of temporal horizons, losses are defined as tactical and strategic. Possible losses from external and internal threat implications have been determined, which have resulted in the development of a four-level structure of total losses from threat implications for the financial security of commercial bank. The proposed sequence of calculations for integrated assessment of threats impact provides an information basis for the development and introducing a set of interrelated organizational-economic measures to implement changes in the subsystem of financial security of commercial bank. The level of threats identified, the nature and extent of financial, personnel, information, and reputational losses are the basis for more efficient use of available resources and for improving the financial security management of commercial bank.

  9. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    Science.gov (United States)

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  10. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    Science.gov (United States)

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  11. The Swedish police as a part of the security systems of nuclear material and other radioactive materials

    International Nuclear Information System (INIS)

    Nylen, L.

    2001-01-01

    Full text: In Sweden a special transport system has been developed for transport of nuclear substances and nuclear waste. This system in itself includes a high security level. Extraordinary circumstances can give cause for protective police measures and intervention. In concerned provinces an incident and emergency response planning take place of the police actions that may be needed at the following types of event: a) bomb threat; b) attack or threat of attack on transport vehicle; c) demonstrations. If a Swedish nuclear power plant is the subject of a bomb threat or other criminal assault, it is in Sweden, according to the Police Act, the task of the police to intervene, interrupt criminal acts and to restore order and security. The role of the Swedish police as regards the physical protection is, among other things, to carry out a certain control within protected area by special trained police personnel before a reactor is put into operation or restarted after revision or repair. Police authorities that have a nuclear power station within its jurisdiction should establish a plan for police actions at the nuclear power station in consultation with legal owner or management of the plant, the Swedish Nuclear Power Administration and the county administration. Special training and frequent practice of response personnel is crucial as well as co-training with key personnel at nuclear power stations. The National Criminal Investigation Department coordinates and commands police measures concerning different types of nuclear transports. Close co-operation with security and operational personnel at the nuclear power stations, operators of the transport system, the Swedish Nuclear Power Administration and the Swedish Radiation Protection Institute is very important. (author)

  12. Preventive medical programmes to personnel exposed to ionizing radiation

    International Nuclear Information System (INIS)

    Estrada F, E.

    1996-01-01

    The increasing use of ionizing radiation in the medical field as well as in industry and research grants has special importance to the security aspects related to the individual as well as his surroundings, reason for which the implementation of effective Occupational Radiation Protection Programmes constitutes a priority. Presently, in Guatemala, an Occupational Medicine Programme, directed to the Radiosanitary watch over of occupationally exposed personnel does not exist. It is the goal in this project to organize and establish such programme, based on protective and training actions focused toward the employee as the main entity, his specific activities and his work surroundings. Medical watch over together with Radiation Protection will permit the reduction of the occurrence probability of accidents or incidents, as well as the limitation of stochastic effects to the undermost values. The application scope of the present project is, in the first place, directed to the occupationally exposed personnel of the Direcci[n General de Energ[a Nuclear, as regulatory entity of these activities, and afterwards, its application in the different institutions which work with ionizing radiations. All the previously exposed is based on the Nuclear Legislation prevailing in Guatemala as well as the recommendations of international organizations. (author)

  13. THEORETICAL BASIS FOR MANAGEMENT OF PERSONNEL RISKS

    OpenAIRE

    Haliashova, Katsiaryna

    2017-01-01

    Necessity of personnel risks management is based on research results. The authors' approaches to the determination of personnel risks and to their management have been explored. The author's definition of the concept of "personnel risks" is proposed. A classification of personnel risks is developed depending on the stage of origin and the tasks of the personnel policy, as well as the methods of management personnel risks in the organization. The article presents a methodical approach to perso...

  14. Securing a control system: experiences from ISO 27001 implementation

    International Nuclear Information System (INIS)

    Vuppala, V.; Vincent, J.; Kusler, J.; Davidson, K.

    2012-01-01

    Recent incidents of breaches, in control systems in specific and information systems in general, have emphasized the importance of security and operational continuity in achieving the quality objectives of an organization, and the safety of its personnel and infrastructure. However, security and disaster recovery are either completely ignored or given a low priority during the design and development of an accelerator control system, the underlying technologies, and the overlaid applications. This leads to an operational facility that is easy to breach, and difficult to recover. Retrofitting security into a control system becomes much more difficult during operations. In this paper we describe our experiences with implementing ISO/IEC 27001 Standard for information security at the Electronics Department of the National Superconducting Cyclotron Laboratory (NSCL) located on the campus of Michigan State University. We describe our risk assessment methodology, the identified risks, the selected controls, their implementation, and our documentation structure. We also report the current status of the project. We conclude with the challenges faced and the lessons learnt. (authors)

  15. Personnel radiation dosimetry

    International Nuclear Information System (INIS)

    1987-01-01

    The book contains the 21 technical papers presented at the Technical Committee Meeting to Elaborate Procedures and Data for the Intercomparison of Personnel Dosimeters organizaed by the IAEA on 22-26 April 1985. A separate abstract was prepared for each of these papers. A list of areas in which additional research and development work is needed and recommendations for an IAEA-sponsored intercomparison program on personnel dosimetry is also included

  16. DOE assessment guide for safeguards and security

    International Nuclear Information System (INIS)

    Bennett, C.A.; Christorpherson, W.E.; Clark, R.J.; Martin, F.; Hodges, Jr.

    1978-04-01

    DOE operations are periodically assessed to assure that special nuclear material, restricted data, and other classified information and DOE facilities are executed toward continuing the effectiveness of the International Atomic Energy Agency safeguards. A guide to describe the philosophy and mechanisms through which these assessments are conducted is presented. The assessment program is concerned with all contractor, field office, and Headquarters activities which are designed to assure that safeguards and security objectives are reached by contractors at DOE facilities and operations. The guide takes into account the interlocking relationship between many of the elements of an effective safeguards and security program. Personnel clearance programs are a part of protecting classified information as well as nuclear materials. Barriers that prevent or limit access may contribute to preventing theft of government property as well as protecting against sabotage. Procedures for control and surveillance need to be integrated with both information systems and procedures for mass balance accounting. Wherever possible, assessment procedures have been designed to perform integrated inspection, evaluation, and follow-up for the safeguards and security program

  17. The tracking and locating system of the mining personnel based on the Zigbee wireless network platform

    Energy Technology Data Exchange (ETDEWEB)

    Xiao-jia, Xie; Li-jun, Cheng; Yong, Wang [Chongqing University, Chongqing (China). College of Resources and Environmental Science

    2007-08-15

    By comparing the advanced Zigbee wireless network system with active RFID, the Zigbee wireless network technology was introduced into the system for tracking and locating of coal miners. The system structure and function characteristics were also introduced. This system makes it convenient to mine administrators, control room personnel and security inspectors to obtain information on the working hours and location of mine workers in the mine. 6 refs., 2 figs., 3 tabs.

  18. Some problems of NPP personnel training

    International Nuclear Information System (INIS)

    Vajshnis, P.P.; Kumkov, L.P.; Omel'chuk, V.V.

    1984-01-01

    Shortcomings of NPP personnel training are discussed. Development of full-scale training systems is necessary for qualitative training operative personnel. Primary problems that should be necessarily solved for ensuring effective training NPP personnel are considered

  19. Security during the Construction of New Nuclear Power Plants: Technical Basis for Access Authorization and Fitness-For-Duty Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Branch, Kristi M.; Baker, Kathryn A.

    2009-09-01

    A technical letter report to the NRC summarizing the findings of a benchmarking study, literature review, and workshop with experts on current industry standards and expert judgments about needs for security during the construction phase of critical infrastructure facilities in the post-September 11 U.S. context, with a special focus on the construction phase of nuclear power plants and personnel security measures.

  20. Trends in Research on the Security of Medical Information in Korea: Focused on Information Privacy Security in Hospitals.

    Science.gov (United States)

    Kim, Yong-Woon; Cho, Namin; Jang, Hye-Jung

    2018-01-01

    Information technology involves a risk of privacy violation in providing easy access to confidential information,such as personal information and medical information through the Internet. In this study, we investigated medical information security to gain a better understanding of trends in research related to medical information security. We researched papers published on '의료정보' and 'medical information' in various Korean journals during a 10-year period from 2005 to 2015. We also analyzed these journal papers for each fiscal year; these papers were categorized into the areas of literature research and empirical research, and were further subdivided according to themes and subjects. It was confirmed that 48 papers were submitted to 35 academic journals. There were 33 (68.8%) literature review articles, and analysis of secondary data was not carried out at all. In terms of empirical research, 8 (16.7%) surveys and 7 (14.6%) program developments were studied. As a result of analyzing these papers according to the research theme by research method, 17 (35.4%) papers on laws, systems, and policies were the most numerous. It was found that among the literature research papers on medical personnel were the most common, and among the empirical research papers, research on experts in information protection and medical personnel were the most common. We suggest that further research should be done in terms of social perception, human resource development, and technology development to improve risk management in medical information systems.

  1. Application of wireless sensor networks in personnel dosage monitoring system of nuclear power plant

    International Nuclear Information System (INIS)

    Chen Yonghong; Zhang Dafa; Jiang Wei; Chen Dengke

    2007-01-01

    Aim to meet the need of personnel dosage monitoring of nuclear power plant, a monitoring system was designed which based on wireless sensor network. First, the basic concept was described; the characteristics of the wireless sensor network applied in the monitoring system of nuclear power plant were also been analyzed; the structure of the system was built too. Finally, the special technologies like the choice of communication mode, the security of communication network and orientation that used in the monitoring system were discussed. (authors)

  2. Integration of holography into the design of bank notes and security documents

    Science.gov (United States)

    Dunn, Paul

    2000-10-01

    The use of holograms and other diffractive optically variable devices have been used successfully in the fight against counterfeiting of security documents for several years. More recently they have become globally accepted as a key security feature on banknotes as reflected in their prime use on the Euronotes to be issues in 2002. The success of the design and origination of these images depends upon their strong visual appeal, their overt and covert content and the ability to offer unique features that provides an extremely difficult barrier for the would be counterfeiter to overcome. The basic design principles both for banknote and general security print application are discussed in this review document. TO be effective as a security device the image must be fit for the purpose. This means that the image must contain the level of overt and covert features that are easy to recognize, containing high level security features and form part of an educational program aimed at the product user and specifically trained security personnel. More specifically it must meet a clearly defined performance criteria.

  3. Ethnic Minority Personnel Careers: Hindrances and Hopes

    OpenAIRE

    Ross, Catharine

    2004-01-01

    Personnel departments often have particular responsibility for equal opportunities within their organizations. This paper explores equal opportunities within personnel departments themselves, in relation to the careers of ethnic minority personnel practitioners. Through primary research, it identifies a range of criteria which can affect personnel careers, of which ethnic origin is often one. However, although being categorized as of ethnic minority origin often hinders personnel careers, the...

  4. Special training of shift personnel

    International Nuclear Information System (INIS)

    Martin, H.D.

    1981-01-01

    The first step of on-the-job training is practical observation phase in an operating Nuclear Plant, where the participants are assigned to shift work. The simulator training for operating personnel, for key personnel and, to some extent, also for maintenance personnel and specialists give the practical feeling for Nuclear Power Plant behaviour during normal and abnormal conditions. During the commissioning phase of the own Nuclear Power Plant, which is the most important practical training, the participants are integrated into the commissioning staff and assisted during their process of practical learning by special instructors. The preparation for the licensing exams is vitally important for shift personnel and special courses are provided after the first non-nuclear trial operation of the plant. Personnel training also includes performance of programmes and material for retraining, training of instructors and assistance in building up special training programmes and material as well as training centers. (orig./RW)

  5. Culturing Security System of Chemical Laboratory in Indonesia

    Directory of Open Access Journals (Sweden)

    Eka Dian Pusfitasari

    2017-04-01

    Full Text Available Indonesia has experiences on the lack of chemical security such as: a number of bombing terrors and hazardous chemicals found in food. Bomb used in terror is a homemade bomb made from chemicals which are widely spread in the research laboratories such as a mixture of pottasium chlorate, sulphur, and alumunium. Therefore, security of chemicals should be implemented to avoid the misused of the chemicals. Although it has experienced many cases of the misuse of chemicals, and many regulations and seminars related to chemical security have been held, but the implementation of chemical security is still a new thing for Indonesian citizens. The evident is coming from the interviews conducted in this study. Questions asked in this interview/survey included: the implementation of chemical safety and chemical security in laboratory; chemical inventory system and its regulation; and training needed for chemical security implementation. Respondents were basically a researcher from Government Research Institutes, University laboratories, senior high school laboratories, and service laboratories were still ambiguous in distinguishing chemical safety and chemical security. Because of this condition, most Indonesia chemical laboratories did not totally apply chemical security system. Education is very important step to raise people awareness and address this problem. Law and regulations should be sustained by all laboratory personnel activities to avoid chemical diversion to be used for harming people and environment. The Indonesia Government could also develop practical guidelines and standards to be applied to all chemical laboratories in Indonesia. These acts can help Government’s efforts to promote chemical security best practices which usually conducted by doing seminars and workshop.

  6. Personnel Policy and Profit

    DEFF Research Database (Denmark)

    Bingley, Paul; Westergård-Nielsen, Niels Chr.

    2004-01-01

    personnel structure variation. It is found that personnel policy is strongly related to economic performance. At the margin, more hires are associated with lower profit, and more separations with higher profit. For the average firm, one new job, all else equal, is associated with ?2680 (2000 prices) lower...

  7. 49 CFR 193.2711 - Personnel health.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Personnel health. 193.2711 Section 193.2711 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2711 Personnel health. Each operator...

  8. 78 FR 76667 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Science.gov (United States)

    2013-12-18

    ... principles of trade, to remove impediments to and perfect the mechanism of a free and open market and a... personnel or the security of facilities and records, thereby enhancing business continuity, workplace safety... filed with the Commission, and all written communications relating to the proposed rule change between...

  9. Mutual Payments in Increase of the Level of Economic Security of Energy Generating Enterprises

    Directory of Open Access Journals (Sweden)

    Ruzhytskyi Andrіy V

    2013-12-01

    Full Text Available The article presents main approaches to the essence of the economic security of an enterprise notion, namely, approach of counter-action to threats, approach of successful market activity and approach of achievement of certain development goals; it identifies the role of economic security of energy generating enterprises in economic security of other subjects and the country in general; it offers definition of the economic security of an enterprise notion as a complex characteristic of the state of the enterprise that reflects the level of the enterprise possibility to ensure functioning and development; it marks out functional components of economic security, which are connected with mutual payments, namely, financial, personnel, technical and technological, political and legal, informational and interface ones; it presents connection of mutual payments with the level of financial component of economic security of enterprises, which envisages financial flow from or to the enterprise for changing the obligation status or its quantitative characteristics.

  10. Going beyond "highly-qualified personnel" to "value-added personnel"

    Science.gov (United States)

    Nantel, Marc; Fox, Bradley; Gelsthorpe, Leanne; Hamilton, Roxy; Marshall, Robert; Williamson, Guida

    2005-10-01

    Employers clamour for more "Highly-Qualified Personnel" (HQP) to hire, and photonics is no exception. The challenge facing all new graduates lies in what actually constitutes a Highly-Qualified Person. Yesterday, an HQP was often understood to be a graduate with a Bachelor's, Master's or Ph.D. degree. Today, industry is demanding that an HQP be either a university or college graduate with strong academic standing AND a sound business and communications skill set. In this paper, we introduce the concept of "Value-Added Personnel" (VAP), which marries both scientific and "soft-skills" aspects, and we present a new program in Ontario to produce VAPs.

  11. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  12. 10 CFR 36.55 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 36.55 Section 36.55 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS Operation of Irradiators § 36.55 Personnel monitoring. (a) Irradiator operators shall wear a personnel dosimeter that is...

  13. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  14. Job Satisfaction and its Influencing Factors among Shomal Health Center of Tehran Personnel in 2014

    Directory of Open Access Journals (Sweden)

    Mohammad-Hossein Safi

    2016-03-01

    Full Text Available Background and Objective: Job satisfaction is an important variable in the area of organizational behavior. Without job satisfaction it is not possible to achieve organizational goals. Therefore the purpose of this study was to assess job satisfaction among Shomal health center of Tehran personnel affiliated to Shahid Beheshti University of Medical Sciences.Materials and Methods: This cross- sectional study was a descriptive-analytical one. Shomal health center of Tehran personnel with at least six months of work experience participated in the study. Data were collected by demographic characteristics and the Minnesota Satisfaction questionnaire. Job satisfaction was categorized into six areas and five levels. Reliability of the questionnaire was confirmed through Chronbach’s alpha calculation. Statistical analysis was conducted using SPSS-18 software.Results: Two hundreds and Fifty-nine personnel participated in the study. The mean (SD of overall satisfaction score was 50.1(12.3 from 100. The study showed that job satisfaction of financial facilities and welfare, educational facilities and job promotion, politics and policy management, quality of human relations, Job security and professional social status were 40%, 43.4%, 53.4%, 66.6%, 54.3% and 57.4%, respectively. Statistical analysis showed a significant relationship between gender and occupational field.Conclusion:  Improving the physical conditions at workplace, increasing employee participation in decision-making, the relative increase in salary, Encouraging personnel, job promotion and intimate relationships between them can lead to increase job satisfaction among employees.

  15. Individual protection of NPP personnel

    International Nuclear Information System (INIS)

    Koshcheev, V.S.; Gol'dshtejn, D.S.; Chetverikova, Z.S.

    1983-01-01

    Specific features of NPP personnel individual protection are considered, mainly with respect to maintenance and repair works on various type reactors. The major concern is given to the selection and application reglamentations of the individual protection system (IPS), employment of sanitary locks, the organization of individual protection under the conditions of a heating microclimate. The ways are specified to the development and introduction of the most effective IPS and improvement of the entire NPP personnel individual protection system with respect to providing the necessary protection effect for maintaining high working capability of the personnel and minimizing the IPS impact on human organism functional systems. The accumulated experience in the personnel individual protection can be applied during construction and operation of NPP's in CMEA member-countries [ru

  16. Personnel monitoring in geologic fields

    International Nuclear Information System (INIS)

    Romanova, I.N.; Seredin, Yu.V.

    1981-01-01

    State of radiation safety for the personnel of geologic crews carrying out neutron logging of wells using Po-Be sources has been evaluated. Given are results of development of methods for the evaluation of individual radiation loads for personnel when working with Po-Be neutron sources useful for the application in practice by a geologic logging crew as well as a quantitative evaluation of profissional radiation loads during this kind of work. The following methods are recommended for personnel monitoring: 1) calculation of whole-body irradiation doses and hands from averaged values of radiation dose rate; 2) calculational tabulated determination of irradiation doses during recharging of shanks of well instruments. Personnel monitoring by means of instrumental methods is not necessary in the considered case [ru

  17. Personnel preferences in personnel planning and scheduling

    NARCIS (Netherlands)

    van der Veen, Egbert

    2013-01-01

    Summary The personnel of an organization often has two conflicting goals. Individual employees like to have a good work-life balance, by having personal preferences taken into account, whereas there is also the common goal to work efficiently. By applying techniques and methods from Operations

  18. Cytogenic Investigations in Flight Personnel

    International Nuclear Information System (INIS)

    Wolf, G.; Obe, G.; Bergau, L.

    1999-01-01

    During long-distance flights at high altitudes flight personnel are exposed to cosmic radiation. In order to determine whether there are biological effects of such low dose radiation exposure in aircrew, chromosomal aberrations were investigated in 59 female cabin attendants and a matched control group of 31 members of station personnel. The mean number of dicentric chromosomes amounts to 1.3 (95% CI 1.0-1.6) per 1,000 cells in cabin attendants and 1.4 (95% CI 1.0-1.9) per 1,000 cells in controls. In an additional control group of 56 female clerks from Berlin the mean frequency of dicentric chromosomes was 1.3 (95% CI 1.0-1.6). Neither in dicentric frequency and distribution nor in other aberrations was a significant difference between the groups of flight and station personnel found. The high frequency of multi-aberrant cells was remarkable in flight personnel as well as in station personnel. The reason for this phenomenon is unknown and needs further investigation. (author)

  19. Electronic Official Personnel Folder System

    Data.gov (United States)

    US Agency for International Development — The eOPF is a digital recreation of paper personnel folder that stores electronic personnel data spanning an individual's Federal career. eOPF allows employees to...

  20. Training of nonlicensed personnel

    International Nuclear Information System (INIS)

    Hetrick, D.E.

    1975-01-01

    The safety and efficiency with which a station operates is a function of the competence and proficiency of all personnel. This includes the nonlicensed personnel who make up the bulk of the station staff. Thus the training of these members of the station complement is an important function in overall station performance. Standards, regulations, regulatory guides, and codes provide guidance to the training requirements for such personnel. Training needs and objectives must be established, a plan prepared and then all incorporated into a training program. A well planned and operated training program will stimulate effective communications between the different groups within the station and between the station and off site support groups

  1. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  2. LANSCE radiation security system (RSS)

    International Nuclear Information System (INIS)

    Gallegos, F.R.

    1996-01-01

    The Radiation Security System (RSS) is an engineered safety system which automatically terminates transmission of accelerated ion beams in response to pre-defined abnormal conditions. It is one of the four major mechanisms used to protect people from radiation hazards induced by accelerated pulsed ion beams at the Los Alamos Neutron Science Center (LANSCE). The others are shielding, administrative policies and procedures, and qualified, trained personnel. Prompt radiation hazards at the half-mile long LANSCE accelerator exist due to average beam intensities ranging from 1 milli-amp for H + beam to 100 micro-amps for the high intensity H - beam. Experimental programs are supplied with variable energy (maximum 800 MeV), pulse-width (maximum 1 msec), and pulse frequency (maximum 120 Hz) ion beams. The RSS includes personnel access control systems, beam spill monitoring systems, and beam current level limiting systems. It is a stand-alone system with redundant logic chains. A fault of the RSS will cause the insertion of fusible beam plugs in the accelerator low energy beam transport. The design philosophy, description, and operation of the RSS are described in this paper

  3. Essence and evolution of the economic security notion

    Directory of Open Access Journals (Sweden)

    Holikov Ivan V.

    2014-01-01

    Full Text Available The article shows the essence and evolution of the economic security notion. It shows that the “economic security” notion is based on a number of definitions and principles of “security”. It establishes that in the result of development of the post-industrial society and complication of social and state relations, this notion was used with economic orientation. It shows that nowadays economic security is understood as the state, in which such components as financial, information, socio-economic, institutional and legal, technical and technological, intellectual and personnel, power and ecological activity are in the states of “absence of threat”, “safety”, “protection from threats”, “protection”, “reliability”, “stability”, “rest”, “independence” and “within acceptable bounds”. Moreover, there is a system of prevention or reduction of impact of threats under controlled conditions. The article shows that economic security is a dynamic component of the economy, which adapts to the needs of the time. The current stage of the state development requires taking into account specific and address specific features of the object of study (for example, branch for ensuring economic security under conditions of appearance of negative phenomena of uncertainty and risk. The prospect of further studies is developing new systems of economic security with consideration of historical grounds and modern tendencies of development of economic relations.

  4. Education and training on nuclear security in Greece

    International Nuclear Information System (INIS)

    Pafilis, C. N.; Kamenopoulou, V.; Maltezos, A.; Seferlis, S.; Dimitriou, P.; Matikas, T. E.

    2009-01-01

    The Greek Atomic Energy Commission is the competent authority responsible for designing, implementing and supervising the radiation protection programme in Greece. According to its statutory law one of its main responsibilities is the provision of education and training to people involved in the national emergency response plan against nuclear and radiological threats. Due to the high requirements demanded for the safe conduct of the Athens 2004 Olympic Games, a nuclear security programme was established and the nuclear security infrastructure of the country was upgraded. Under this framework, GAEC provided training on radiation protection, prevention, detection, emergency preparedness and response to the personnel involved in the emergency plan. Since that time, the GAEC continues to organize seminars frequently addressed to the organizations involved in the emergency plan, in order to establish the sustainability of national operational capability on preparedness and response. (authors)

  5. Security analysis of RSA cryptosystem algorithm and it’s properties

    International Nuclear Information System (INIS)

    Liu, Chenglian; Guo, Yongning; Lin, Juan

    2014-01-01

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA

  6. Security analysis of RSA cryptosystem algorithm and it’s properties

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  7. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  8. Best Practices for the Security of Radioactive Materials

    International Nuclear Information System (INIS)

    Coulter, D.T.; Musolino, S.

    2009-01-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass

  9. Technical guidelines for personnel dosimetry calibrations

    International Nuclear Information System (INIS)

    Roberson, P.L.; Fox, R.A.; Hadley, R.T.; Holbrook, K.L.; Hooker, C.D.; McDonald, J.C.

    1983-01-01

    A base of technical information has been acquire and used to evaluate the calibration, design, and performance of selected personnel systems in use at Department of Energy (DOE) facilites. A technical document was prepared to guide DOE and DOE contractors in selecting and evaluating personnel dosimetry systems and calibration. A parallel effort was initiated to intercompare the adiological calibrations standards used to calibrate DOE personnel dosimeters

  10. Personnel Officers: Judging Their Qualifications.

    Science.gov (United States)

    Webb, Gisela

    1988-01-01

    Discusses the backgrounds and qualifications appropriate for a library personnel administrator, including (1) a master's degree in library science; (2) library work experience; (3) additional training in administration, personnel management, organizational development, and psychology; and (4) personal attributes such as good communication skills,…

  11. The accreditation programs and proficiency test in Taiwan for personnel dosimeter services (1991-1998)

    International Nuclear Information System (INIS)

    Lee, B.T.; Hwang, W.S.; Su, S.H.

    2000-01-01

    According to the ionizing radiation safety regulation approved by the ROC Atomic Energy Council (AEC), personnel dosimeter processors shall be accredited by the Chinese National Laboratory Accreditation (CNLA) program before offering dosimeter services and shall be accredited every two years (now has been rescheduled to be every three years since 1996). The aim of this program is to secure quality and technical capability of personnel dosimeters, and to provide systematic improvement for the internal calibration and testing laboratory applying for accreditation by means of assessment procedures. The criteria used to evaluate the capability at laboratories are ISO/IEC 25 (1990) and technical guide in different accreditation fields. The Institute of Nuclear Energy Research (INER) was entrusted by CNLA as the central laboratory to perform the proficiency test of personnel dosimeters for laboratory accreditation in December 1990. Such proficiency tests, based on ANSI N13.11 (1983), which is mainly separated to accident categories and protection categories which consists of eight parts of tests including single and mixture radiation of x-ray, gamma, beta and neutron, have been conducted four times, in 1991, 1993, 1995 and 1998. This paper deals with the test procedures and results of proficiency tests of personnel dosimeters from 1991 until 1998. The results of the four proficiency tests showed that, for accident categories, the pass rate is about 91%; for protection categories, the pass rate is about 98%. Meanwhile, the central laboratory will adopt a new version of HPS N13.11 (1993) to replace ANSI N13.11 (1983) as new criteria for the next proficiency test to be conducted in 2001. (author)

  12. A Proven Methodology for Developing Secure Software and Applying It to Ground Systems

    Science.gov (United States)

    Bailey, Brandon

    2016-01-01

    Part Two expands upon Part One in an attempt to translate the methodology for ground system personnel. The goal is to build upon the methodology presented in Part One by showing examples and details on how to implement the methodology. Section 1: Ground Systems Overview; Section 2: Secure Software Development; Section 3: Defense in Depth for Ground Systems; Section 4: What Now?

  13. Personnel Preparation.

    Science.gov (United States)

    Fair, George, Ed.; Stodden, Robert, Ed.

    1981-01-01

    Three articles comprise a section on personnel preparation in vocational education. Articles deal with two inservice programs in career/vocational education for the handicapped and a project to train paraprofessionals to assist special educators in vocational education. (CL)

  14. Educating personnel for nuclear technology in Czechoslovakia

    International Nuclear Information System (INIS)

    Otcenasek, P.

    1980-01-01

    The basic preconditions are discussed of educating personnel for nuclear power and nuclear technology in Czechoslovakia. In educating specialists, the high societal significance of nuclear power and the need to obtain qualified personnel for safeguarding safety and reliability of nuclear facilities operation should primarily be borne in mind. The system of training applies not only to operating and maintenance personnel of nuclear power plants but also to fuel and power generation, transport, engineering, building industry, health care, education and other personnel. (J.B.)

  15. Personnel Practices for Small Colleges.

    Science.gov (United States)

    Bouchard, Ronald A.

    Personnel administration in higher education is the focus of this "hands-on, how-to-do-it" guide that provides fundamental materials for developing and maintaining a sound personnel program. Part One (Employment) examines government regulations, employee recruitment and selection, pre-employment inquiries and screening, post-employment process,…

  16. Perspective on Secure Development Activities and Features of Safety I and C Systems

    International Nuclear Information System (INIS)

    Kang, Youngdoo; Yu, Yeong Jin; Kim, Hyungtae; Kwon, Yong il; Park, Yeunsoo; Choo, Jaeyul; Son, Jun Young; Jeong, Choong Heui

    2015-01-01

    The Enforcement Decree of the Act on Physical Protection and Radiological Emergency (ED-APPRE) was revised December 2013 to include security requirements on computer systems at nuclear facilities to protect those systems against malicious cyber-attacks. It means Cyber-Security-related measures, controls and activities of safety I and C systems against cyber-attacks shall meet the requirements of ED-APPRE. Still regulation upon inadvertent access or non-malicious modifications to the safety I and C systems is covered under the Nuclear Safety Act. The objective of this paper is to propose KINS' regulatory perspective on secure development and features against non-malicious access or modification of safety I and C systems. Secure development activities and features aim to prevent inadvertent and non-malicious access, and to prevent unwanted action from personnel or connected systems for ensuring reliable operation of safety I and C systems. Secure development activities of safety I and C systems are life cycle activities to ensure unwanted, unneeded and undocumented code is not incorporated into the systems. Secure features shall be developed, verified and qualified throughout the development life cycle

  17. Perspective on Secure Development Activities and Features of Safety I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Youngdoo; Yu, Yeong Jin; Kim, Hyungtae; Kwon, Yong il; Park, Yeunsoo; Choo, Jaeyul; Son, Jun Young; Jeong, Choong Heui [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-05-15

    The Enforcement Decree of the Act on Physical Protection and Radiological Emergency (ED-APPRE) was revised December 2013 to include security requirements on computer systems at nuclear facilities to protect those systems against malicious cyber-attacks. It means Cyber-Security-related measures, controls and activities of safety I and C systems against cyber-attacks shall meet the requirements of ED-APPRE. Still regulation upon inadvertent access or non-malicious modifications to the safety I and C systems is covered under the Nuclear Safety Act. The objective of this paper is to propose KINS' regulatory perspective on secure development and features against non-malicious access or modification of safety I and C systems. Secure development activities and features aim to prevent inadvertent and non-malicious access, and to prevent unwanted action from personnel or connected systems for ensuring reliable operation of safety I and C systems. Secure development activities of safety I and C systems are life cycle activities to ensure unwanted, unneeded and undocumented code is not incorporated into the systems. Secure features shall be developed, verified and qualified throughout the development life cycle.

  18. Challenges in strengthening radiation safety and security programme in Malaysia

    International Nuclear Information System (INIS)

    Noriah, M.A.

    2010-01-01

    This paper illustrates the Malaysian experience in implementing steps in strengthening radiation safety and security through certification of radiation safety personnel, which is dedicated to meet the current and future needs in sustainability of radiation safety and security systems. Commitment from the workforce to treat safety as a priority and the ability to turn a requirement into a practical language is also important in implementing the radiation safety policy efficiently. Through this effort, we are able to create a basis for adequate protection of workers, the public and the environment and encourage licensees to manage radiation safety and security based on performance, and not on compliance culture, with the final objective of professing a safety culture through self regulation. This will certainly benefit an organisation with ultimate goals are to continuously strive for a healthy, accident free and environmentally sound workplace and community, while providing the technical support needed to meet the national mission. This will strengthen the radiation safety and security programme and could be used to assist in manpower development once Malaysia makes the decision to embark on a nuclear power programme. (author)

  19. Development of NPP personnel training system in Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Tarykin, V. [Operation Personnel Training Department, Khmelnitsky NPP, Training Center, Neteshin 30100, Khmelnitsky region (Ukraine)]. E-mail: tarykinv@ukr.net

    2005-07-01

    Modern personnel training and retraining system is a guarantee of NPPs safe reliable operation. Since the time when independence of Ukraine was proclaimed personnel training system was created directly at NPPs. This system is based on the latest legislation framework, developed subject to IAEA recommendations, gained international experience in the field of personnel training in view of increased demands to personnel qualification. Training Centers, formed at each plant, form one of the main components of NPP personnel training. Personnel training at Training Centers is performed in accordance with standard programmes. Simulator training base was created by joint efforts of specialists from the USA, Russia and Ukraine. Establishing manager training system and replacement reserves for National Nuclear Energy Generating Company 'ENERGOATOM' (NNEGC 'ENERGOATOM') managerial personnel, including training programme and training materials development, teacher selection and training, is under way. (author)

  20. 34 CFR 361.18 - Comprehensive system of personnel development.

    Science.gov (United States)

    2010-07-01

    ... implementation of a plan to address the current and projected needs for personnel who are qualified in accordance... accordance with paragraph (c) of this section, including personnel from minority backgrounds and personnel... retraining, recruiting, and hiring personnel; (B) The specific time period by which all State unit personnel...

  1. 49 CFR 1542.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1542.217 Section 1542... Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used... the criminal laws of the State and local jurisdictions in which the airport is located— (1) A crime...

  2. 49 CFR 1544.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1544.217 Section 1544... AND COMMERCIAL OPERATORS Operations § 1544.217 Law enforcement personnel. (a) The following applies to... for law enforcement personnel meeting the qualifications and standards specified in §§ 1542.215 and...

  3. Personnel Development Practices in Turkish Education System

    Science.gov (United States)

    Ozdemir, Tuncay Yavuz

    2016-01-01

    Nowadays everything develops and changes very quickly and sustainability of organizational goals will be possible only when personnel can keep up with these changes. From administrative aspect it is important to enhance personnel's potential and prompt them to achieve organizational goals. Personnel development is a process which influences and…

  4. Image-based surveillance and security systems using personal computers for device aiming and digital image comparison

    International Nuclear Information System (INIS)

    Quiett, S.; Axtell, L.H.

    1987-01-01

    A detection-type security system using enhanced capability cameras or other imaging devices can aid in maintaining security from long distance and/or for large areas. To do so requires that the imaging device(s) be repeatedly and accurately positioned so that no areas are overlooked. Digital control using personal computers is the simplest method of achieving positional accuracy. The monitoring of large areas and/or a large number of areas also requires that a substantial quantity of visual information be catalogued and evaluated for potential security problems. While security personnel alone are typically used for such monitoring, as the quantity of visual information increases, the likelihood that potential security threats will be missed also increases. The ability of an image-based security system to detect potential security problems can be further increased with the use of selected image processing techniques. Utilizing personal computers for both imaging device position control as well as image processing, surveillance of large areas can be performed by a limited number of individuals with a high level of system confidence

  5. Security of radioactive sources. Interim guidance for comment

    International Nuclear Information System (INIS)

    2003-06-01

    balance between managing sources safely and securely, while still enabling them to be used by authorized personnel without undue hindrance. Thus the level of security should be commensurate with the potential hazard posed by the source, recognizing the need to ensure appropriate use of the source for beneficial purposes

  6. National Finance Center Personnel/Payroll System

    Data.gov (United States)

    US Agency for International Development — The NFC system is an USDA system used for processing transactions for payroll/personnel systems. Personnel processing is done through EPIC/HCUP, which is web-based....

  7. Cyber Security for the Spaceport Command and Control System: Vulnerability Management and Compliance Analysis

    Science.gov (United States)

    Gunawan, Ryan A.

    2016-01-01

    With the rapid development of the Internet, the number of malicious threats to organizations is continually increasing. In June of 2015, the United States Office of Personnel Management (OPM) had a data breach resulting in the compromise of millions of government employee records. The National Aeronautics and Space Administration (NASA) is not exempt from these attacks. Cyber security is becoming a critical facet to the discussion of moving forward with projects. The Spaceport Command and Control System (SCCS) project at the Kennedy Space Center (KSC) aims to develop the launch control system for the next generation launch vehicle in the coming decades. There are many ways to increase the security of the network it uses, from vulnerability management to ensuring operating system images are compliant with securely configured baselines recommended by the United States Government.

  8. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E.

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs

  9. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs.

  10. User's guide for evaluating physical security capabilities of nuclear facilities by the EASI method

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1977-06-01

    This handbook is a guide for evaluating physical security of nuclear facilities using the ''Estimate of Adversary Sequence Interruption (EASI)'' method and a hand-held programmable calculator. The handbook is intended for use by personnel at facilities where special nuclear materials are used, processed, or stored. It may also be used as a design aid for such facilities by potential licensees

  11. Conditions for selection, training and placement of personnel

    International Nuclear Information System (INIS)

    Chrkavy, L.

    1983-01-01

    Methods applied in the choice of personnel include: the assessment of personnel files, references, interviews, examinations, long-term observation of the respective person. Investment intents go hand in hand with the concept of labour demands. The planned employment of personnel takes place from the very beginning of the construction of the power plant. At the Bohunice V-1 nuclear power plant 23 university graduates, 29 secondary school graduates and 64 graduates of vocational schools were employed every year. Social measures and complex care are being implemented. Personnel is being selected also on the basis of an assessment of their psychic qualities which are very important in view of the high personal and social responsibility of nuclear power plant personnel. The high technical standard of the equipment places high demands on the education level of all personnel, high demands on training, high remuneration and high level of allround care of personnel. (M.D.)

  12. College law enforcement and security department responses to alcohol-related incidents: a national study.

    Science.gov (United States)

    Bernat, Debra H; Lenk, Kathleen M; Nelson, Toben F; Winters, Ken C; Toomey, Traci L

    2014-08-01

    Campus police and security personnel are often the first to respond to alcohol-related incidents on campus. The purpose of this study is to examine how campus law enforcement and security respond to alcohol-related incidents, and how consequences and communication differ based on characteristics of the incident. Directors of campus police/security from 343 colleges across the United States completed a survey regarding usual practice following serious, underage, and less serious alcohol incidents on and off campus. Campus law enforcement and security most commonly reported contacting campus officials. A minority reported issuing citations and referring students to the health center. Enforcement actions were more commonly reported for serious and underage incidents than for less serious incidents. Large (vs. small) colleges, public (vs. private) colleges, and those located in small (vs. large) towns more consistently reported taking actions against drinkers. Understanding how campus police and security respond to alcohol-related incidents is essential for reducing alcohol-related problems on college campuses. Copyright © 2014 by the Research Society on Alcoholism.

  13. Musculoskeletal disorders in main battle tank personnel

    DEFF Research Database (Denmark)

    Nissen, Lars Ravnborg; Guldager, Bernadette; Gyntelberg, Finn

    2009-01-01

    PURPOSE: To compare the prevalence of musculoskeletal disorders of personnel in the main battle tank (MBT) units in the Danish army with those of personnel in other types of army units, and to investigate associations between job function in the tank, military rank, and musculoskeletal problems......, and ankle. RESULTS AND CONCLUSIONS: There were only 4 women in the MBT group; as a consequence, female personnel were excluded from the study. The participation rate was 58.0% (n = 184) in the MBT group and 56.3% (n = 333) in the reference group. The pattern of musculoskeletal disorders among personnel...

  14. IAEA activities on NPP personnel training and qualification

    International Nuclear Information System (INIS)

    Kossilov, A.

    1998-01-01

    Activities of IAEA concerning training and qualification of NPP personnel consider the availability of sufficient number of competent personnel which is one of the most critical requirements for safe and reliable NPP operation and maintenance. Competence of personnel is essential for reducing the frequency of events connected to human errors and equipment failures. The IAEA Guidebook on Nuclear Power Plant Personnel Training and its Evaluation incorporates the experience gained worldwide and provides recommendations on the use of SAT being the best practice for attaining and maintaining the qualification and competence of NPP personnel and for quality assurance of training

  15. Special report. Hospitals that are becoming 'hotel friendly' to guests ... and the role played by security officers.

    Science.gov (United States)

    1996-01-01

    Faced with increasing competition, hospitals in New York City are developing programs to become more user friendly and, like hotels, to treat patients more as "guests" than as "customers." These programs, which have particular applications for security personnel, are also seeking to improve communications and relationships among the hospital's medical staff and other employees. In this report, we'll describe some of these efforts in which hospitals are turning to hoteliers, consultants, and others for advice in the area of customer service, and the role seen for hospital security.

  16. History of physical security R and D

    International Nuclear Information System (INIS)

    Myre, W.C.; De Montmollin, J.M.

    1987-01-01

    Serious concern about physical protection of nuclear facilities began around 1972. R and D was initiated at Sandia National Laboratory which had developed techniques to protect weapons for many years. Special vehicles, convoy procedures, and a communications system previously developed for weapons shipments were improved and extended for shipments of other sensitive materials. Barriers, perimeter alarms, portal and internal control systems were developed, tested, and published in handbooks and presented at symposia. Training programs were initiated for U.S. and foreign personnel. Containment and surveillance techniques were developed for the IAEA. Presently emphasis is on computer security, active barriers, and techniques to prevent theft or sabotage by ''insiders''

  17. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  18. The development of mobile robot for security application and nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  19. The development of mobile robot for security application and nuclear facilities

    International Nuclear Information System (INIS)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M.

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  20. Training of maintenance personnel

    International Nuclear Information System (INIS)

    Rabouhams, J.

    1986-01-01

    This lecture precises the method and means developed by EDF to ensure the training of maintenance personnel according to their initial educational background and their experience. The following points are treated: General organization of the training for maintenance personnel in PWR and GCR nuclear power stations and in Creys Malville fast breeder reactor; Basic nuclear training and pedagogical aids developed for this purpose; Specific training and training provided by contractors; complementary training taking into account the operation experience and feedback; Improvement of velocity, competence and safety during shut-down operations by adapted training. (orig.)

  1. Personnel external dose monitoring system

    International Nuclear Information System (INIS)

    Zhao Hengyuan

    1989-01-01

    The status and trend of personnel external dose monitoring system are introduced briefly. Their characteristics, functions and TLD bedges of some commercially available automatic TLD system, including UD-710A (Matsushita, Japan), Harshaw-2271, 2276 (Harshaw, USA), Harshaw-8000 (Harshaw/Filtrol), Studsvik-1313 (Sweden) and Pitman-800 (UK) were depicted in detail. Finally, personnel dose management and record keeping system were presented and two examples were given

  2. 32 CFR 720.20 - Service of process upon personnel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Service of process upon personnel. 720.20... DELIVERY OF PERSONNEL; SERVICE OF PROCESS AND SUBPOENAS; PRODUCTION OF OFFICIAL RECORDS Service of Process and Subpoenas Upon Personnel § 720.20 Service of process upon personnel. (a) General. Commanding...

  3. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  4. Improving human performance in maintenance personnel

    International Nuclear Information System (INIS)

    Gonzalez Anez, Francisco; Agueero Agueero, Jorge

    2010-01-01

    The continuous evolution and improvement of safety-related processes has included the analysis, design and development of training plans for the qualification of maintenance nuclear power plant personnel. In this respect, the international references in this area recommend the establishment of systematic qualification programmes for personnel performing functions or carrying out safety related tasks. Maintenance personnel qualification processes have improved significantly, and training plans have been designed and developed based on Systematic Approach to Training methodology to each job position. These improvements have been clearly reflected in recent training programmes with new training material and training facilities focused not only on developing technical knowledge and skills but also on improving attitudes and safety culture. The objectives of maintenance training facilities such as laboratories, mock-ups real an virtual, hydraulic loops, field simulators and other training material to be used in the maintenance training centre are to cover training necessities for initial and continuous qualification. Evidently, all these improvements made in the qualification of plant personnel should be extended to include supplemental personnel (external or contracted) performing safety-related tasks. The supplemental personnel constitute a very spread group, covering the performance of multiple activities entailing different levels of responsibility. Some of these activities are performed permanently at the plant, while others are occasional or sporadic. In order to establish qualification requirements for these supplemental workers, it is recommended to establish a rigorous analysis of job positions and tasks. The objective will be to identify the qualification requirements to assure competence and safety. (authors)

  5. Evaluation of the Nutrition of the Bulgarian Army Military Personnel During the Preparation for Participation in Expeditionary Operations

    Directory of Open Access Journals (Sweden)

    Nichev Nikolay

    2017-12-01

    Full Text Available The development of the military art and of the rapidly changing security environment, define the developing and the formation of new capabilities for their management. The increasing importance of the Expeditionary Forces of NATO demands the developing of the national legislation, connected with the nutrition of the Bulgarian Army military personnel, participating in expeditionary operations. In response to the tasks, delegated to the armed forces during their participation in expeditionary operations, the provision of the units with food becomes a priority logistic capability.

  6. Occupational exposure of nuclear medicine personnel

    International Nuclear Information System (INIS)

    Roessler, M.

    1982-01-01

    The results are given of measurements of the radiation burden of personnel in departments of nuclear medicine in the years 1979 to 1981 using film dosemeters and ring thermoluminescence dosemeters evaluated by the national personnel dosemeter service. The relations are examined of the exposure of hands and the preparation of radiopharmaceuticals and especially their use for examinations. Certain organizational measures are indicated for reducina radiation burden in a laboratory for the preparation of radiopharmaceuticals. The results of measurements and evaluations of radiation burden of personnel of nuclear medicine departments are confronted with conclusions published in the literature. (author)

  7. Personnel neutron dosimetry

    International Nuclear Information System (INIS)

    Hankins, D.

    1982-04-01

    This edited transcript of a presentation on personnel neutron discusses the accuracy of present dosimetry practices, requirements, calibration, dosemeter types, quality factors, operational problems, and dosimetry for a criticality accident. 32 figs

  8. 10 CFR 34.47 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 34.47 Section 34.47 Energy NUCLEAR REGULATORY COMMISSION LICENSES FOR INDUSTRIAL RADIOGRAPHY AND RADIATION SAFETY REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Radiation Safety Requirements § 34.47 Personnel monitoring. (a) The licensee may not...

  9. 10 CFR 26.155 - Laboratory personnel.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Laboratory personnel. 26.155 Section 26.155 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Laboratories Certified by the Department of Health and Human... ensure the continued competency of laboratory personnel by documenting their in-service training...

  10. Competency assessments for nuclear industry personnel

    International Nuclear Information System (INIS)

    2004-04-01

    In 1996, the IAEA published Technical Reports Series No. 380, Nuclear Power Plant Personnel Training and its Evaluation: A Guidebook. This publication provides guidance for the development, implementation and evaluation of training programmes for all nuclear power plant personnel using the systematic approach to training (SAT) methodology. The SAT methodology has since been adopted and used for the development and implementation of training programmes for all types of nuclear facility and activities in the nuclear industry. The IAEA Technical Working Group on Training and Qualification of Nuclear Power Plant Personnel recommended that an additional publication be prepared to provide further guidance concerning competency assessments used for measuring the knowledge, skills and attitudes of personnel as the result of training. This publication has been prepared in response to that recommendation. A critical component of SAT (as part of the implementation phase) is the assessment of whether personnel have achieved the standards identified in the training objectives. The nuclear industry spends a significant amount of resources conducting competency assessments. Competency assessments are used for employee selection, trainee assessment, qualification, requalification and authorization (in some Member States the terminology may be 'certification' or 'licensing'), and job advancement and promotion. Ineffective testing methods and procedures, or inappropriate interpretation of test results, can have significant effects on both human performance and nuclear safety. Test development requires unique skills and, as with any skill, training and experience are needed to develop and improve them. Test item and examination development, use, interpretation of results and examination refinement, like all other aspects of SAT, should be part of an ongoing, systematic process. This publication is primarily intended for use by personnel responsible for developing and administering

  11. Cyber Safety and Security for Reduced Crew Operations (RCO)

    Science.gov (United States)

    Driscoll, Kevin

    2017-01-01

    NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified. The approach includes a comprehensive safety-hazard analysis of the RCO system to determine top level INFOSEC requirements for RCO and proposes an option for effective RCO implementation. This paper concludes with questioning the economic viability of RCO in light of the expense of overcoming the operational safety and security hazards it would introduce.

  12. The role of the health physicist in nuclear security.

    Science.gov (United States)

    Waller, Edward J; van Maanen, Jim

    2015-04-01

    Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far

  13. 5 CFR 9901.363 - Premium pay for health care personnel.

    Science.gov (United States)

    2010-01-01

    ... health care personnel. (1) Health care personnel working a tour of duty, any part of which falls between....362(c). (2) Health care personnel are entitled to pay for night duty for a period of paid absence only... excused from work. (d) Pay for weekend duty for health care personnel. (1) Health care personnel who work...

  14. New-generation security network with synergistic IP sensors

    Science.gov (United States)

    Peshko, Igor

    2007-09-01

    Global Dynamic Monitoring and Security Network (GDMSN) for real-time monitoring of (1) environmental and atmospheric conditions: chemical, biological, radiological and nuclear hazards, climate/man-induced catastrophe areas and terrorism threats; (2) water, soil, food chain quantifiers, and public health care; (3) large government/public/ industrial/ military areas is proposed. Each GDMSN branch contains stationary or mobile terminals (ground, sea, air, or space manned/unmanned vehicles) equipped with portable sensors. The sensory data are transferred via telephone, Internet, TV, security camera and other wire/wireless or optical communication lines. Each sensor is a self-registering, self-reporting, plug-and-play, portable unit that uses unified electrical and/or optical connectors and operates with IP communication protocol. The variant of the system based just on optical technologies cannot be disabled by artificial high-power radio- or gamma-pulses or sunbursts. Each sensor, being supplied with a battery and monitoring means, can be used as a separate portable unit. Military personnel, police officers, firefighters, miners, rescue teams, and nuclear power plant personnel may individually use these sensors. Terminals may be supplied with sensors essential for that specific location. A miniature "universal" optical gas sensor for specific applications in life support and monitoring systems was designed and tested. The sensor is based on the physics of absorption and/or luminescence spectroscopy. It can operate at high pressures and elevated temperatures, such as in professional and military diving equipment, submarines, underground shelters, mines, command stations, aircraft, space shuttles, etc. To enable this capability, the multiple light emitters, detectors and data processing electronics are located within a specially protected chamber.

  15. 10 CFR 39.65 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 39.65 Section 39.65 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Radiation Safety Requirements § 39.65 Personnel monitoring. (a) The licensee may not permit an individual to act as a logging...

  16. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    Science.gov (United States)

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  17. Assuring the competence of nuclear power plant contractor personnel

    International Nuclear Information System (INIS)

    2001-07-01

    This report was prepared in response to a recommendation by the IAEA International Working Group on Training and Qualification of NPP Personnel (JWG-T and Q) and supported by a number of IAEA meetings on NPP personnel training. IAEA publications on NPP training are the only international documents available to all Member States with nuclear programmes. This report complements the following IAEA publications on NPP personnel training: Technical Reports Series No. 380, Nuclear Power Plant Personnel Training and its Evaluation, A Guidebook; IAEA-TECDOC-1057, Experience in the Use of Systematic Approach to Training (SAT) for Nuclear Power Plant Personnel and IAEA-TECDOC-1063, IAEA World Survey on Nuclear Power Plant Personnel Training. This TECDOC also supplements the IAEA Safety Guide 50-SG-O1 (Rev. 1), Staffing of Nuclear Power Plants and the Recruitment Training and Authorization of Operating Personnel and Safety Standards Series No. NS-R-2, Safety of Nuclear Power Plants. Operation. Within the context of this report NPP contractors are defined as any personnel working for a nuclear power plant who are not directly employed by the nuclear power plant. Competence is the ability to perform to identified standards; it comprises skills, knowledge and attitudes and may be developed through education, experience and training. Qualification is a formal statement of achievement, resulting from an auditable assessment; if competence is assessed, the qualification becomes a formal statement of competence and may be shown on a certificate, diploma, etc. It is recognized that personnel are used to perform tasks that are of a specialised or temporary nature where it is not feasible to hire or maintain a full-time NPP employee. Accordingly, contractors may be used in a variety of situations to support NPPs. Typical situations include: supplies and services being delivered by the contractors that are subject to different quality standards based on a graded approach to assuring

  18. Assuring the competence of nuclear power plant contractor personnel

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This report was prepared in response to a recommendation by the IAEA International Working Group on Training and Qualification of NPP Personnel (JWG-T and Q) and supported by a number of IAEA meetings on NPP personnel training. IAEA publications on NPP training are the only international documents available to all Member States with nuclear programmes. This report complements the following IAEA publications on NPP personnel training: Technical Reports Series No. 380, Nuclear Power Plant Personnel Training and its Evaluation, A Guidebook; IAEA-TECDOC-1057, Experience in the Use of Systematic Approach to Training (SAT) for Nuclear Power Plant Personnel and IAEA-TECDOC-1063, IAEA World Survey on Nuclear Power Plant Personnel Training. This TECDOC also supplements the IAEA Safety Guide 50-SG-O1 (Rev. 1), Staffing of Nuclear Power Plants and the Recruitment Training and Authorization of Operating Personnel and Safety Standards Series No. NS-R-2, Safety of Nuclear Power Plants. Operation. Within the context of this report NPP contractors are defined as any personnel working for a nuclear power plant who are not directly employed by the nuclear power plant. Competence is the ability to perform to identified standards; it comprises skills, knowledge and attitudes and may be developed through education, experience and training. Qualification is a formal statement of achievement, resulting from an auditable assessment; if competence is assessed, the qualification becomes a formal statement of competence and may be shown on a certificate, diploma, etc. It is recognized that personnel are used to perform tasks that are of a specialised or temporary nature where it is not feasible to hire or maintain a full-time NPP employee. Accordingly, contractors may be used in a variety of situations to support NPPs. Typical situations include: supplies and services being delivered by the contractors that are subject to different quality standards based on a graded approach to assuring

  19. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    Science.gov (United States)

    2008-12-01

    and the National Guard, which operated in rural areas.”133 A National Intelligence Directorate supported the 60,000 strong security personnel in...Londoño, Juan Luis, Alejandro Gaviria, and Rodrigo Guerrero eds., Asalto al Desarrollo (Washington, D.C.: Inter-American Development Bank, 2000...Guerrero eds., Asalto al desarrollo . Washington, D.C.: Inter-American Development Bank, 2000. “Saca unimpressed with size of U.S. funding.” Latin

  20. On the security of two remote user authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  1. 30 CFR 77.1400 - Personnel hoists and elevators.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Personnel hoists and elevators. 77.1400 Section 77.1400 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY AND HEALTH MANDATORY SAFETY STANDARDS, SURFACE COAL MINES AND SURFACE WORK AREAS OF UNDERGROUND COAL MINES Personnel Hoisting § 77.1400 Personnel...

  2. 45 CFR 201.11 - Personnel merit system review.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Personnel merit system review. 201.11 Section 201... STATES FOR PUBLIC ASSISTANCE PROGRAMS Review and Audits § 201.11 Personnel merit system review. A personnel merit system review is carried out by the Office of State Merit Systems of the Office of the...

  3. 21 CFR 211.28 - Personnel responsibilities.

    Science.gov (United States)

    2010-04-01

    ... apparel, such as head, face, hand, and arm coverings, shall be worn as necessary to protect drug products... observation) to have an apparent illness or open lesions that may adversely affect the safety or quality of... medical personnel not to jeopardize the safety or quality of drug products. All personnel shall be...

  4. Secure automated fabrication (SAF). Phase I interim report: a systems analysis

    International Nuclear Information System (INIS)

    1979-01-01

    An advanced Secure Automated Fabrication (SAF) System is being developed for mixed uranium and plutonium fuel fabrication. SAF System development will ultimately result in systems which maximize personnel radiation protection, restrict and control access to SNM material, improve containment and detection systems for nuclear materials, provide adequate SNM accountability and improve product uniformity and quality. A systems requirement analysis study was initiated to establish the consistent and objective set of requirements within which the choice among alternatives represents the balanced viewpoints of performance, achievability and risk

  5. Guidelines for the calibration of personnel dosimeters

    International Nuclear Information System (INIS)

    Roberson, P.L.; Holbrook, K.L.

    1984-01-01

    This guide describes minimum acceptable performance levels for personnel dosimetry systems used at Department of Energy (DOE) facilities. The goal is to improve both the quality of radiological calibrations and the methods of comparing reported occupational doses between DOE facilities. Reference calibration techniques are defined. A standard for evaluation of personnel dosimetry systems and recommended design parameters for personnel dosimeters are also included. Approximate intervals for the radiation energies for which these guidelines are appropriate are 15 keV to 2 MeV for photons; above 0.3 MeV for beta particles; and 1 keV to 2 MeV for neutrons. An analysis of ANSI N13.11 was completed using performance evaluations of selected personnel dosimetry systems in use at DOE facilities. The results of this analysis are incorporated in the guidelines

  6. SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Amina AIT OUAHMAN

    2014-10-01

    Full Text Available Today, cloud computing is defined and talked about across the ICT industry under different contexts and with different definitions attached to it. It is a new paradigm in the evolution of Information Technology, as it is one of the biggest revolutions in this field to have taken place in recent times. According to the National Institute for Standards and Technology (NIST, “cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction” [1]. The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in successive years by companies and organizations. Clouds bring out tremendous benefits for both individuals and enterprises. Clouds support economic savings, outsourcing mechanisms, resource sharing, any-where any-time accessibility, on-demand scalability, and service flexibility. Clouds minimize the need for user involvement by masking technical details such as software upgrades, licenses, and maintenance from its customers. Clouds could also offer better security advantages over individual server deployments. Since a cloud aggregates resources, cloud providers charter expert security personnel while typical companies could be limited with a network administrator who might not be well versed in cyber security issues. The new concepts introduced by the clouds, such as computation outsourcing, resource sharing, and external data warehousing, increase the security and privacy concerns and create new security challenges. Moreover, the large scale of the clouds, the proliferation of mobile access devices (e

  7. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  8. Maintenance Personnel Performance Simulation (MAPPS) model

    International Nuclear Information System (INIS)

    Siegel, A.I.; Bartter, W.D.; Wolf, J.J.; Knee, H.E.; Haas, P.M.

    1984-01-01

    A stochastic computer model for simulating the actions and behavior of nuclear power plant maintenance personnel is described. The model considers personnel, environmental, and motivational variables to yield predictions of maintenance performance quality and time to perform. The mode has been fully developed and sensitivity tested. Additional evaluation of the model is now taking place

  9. Health-physics personnel: a need unfulfilled

    International Nuclear Information System (INIS)

    Kathren, R.E.

    1983-06-01

    Current trends and conditions in the health physics profession are discussed. The need for health physics personnel in academia, nuclear power plants, other nuclear industry, national laboratories, and other sectors and the shortfall in qualified personnel to fill the available positions is described. Reasons for the present situation and recommendations for alleviating it are presented

  10. Innovative activity of personnel of organization

    Directory of Open Access Journals (Sweden)

    V. N.Belkin

    2010-09-01

    Full Text Available This article deals with transition way of economic of the Russian Federation on an innovative way of development. The special attention is given the internal social and economic environment of the organizations which, as a rule, counteracts development of innovative activity of the personnel. Ways of increase of innovative activity of the personnel are offered.

  11. Perspectives of NPP personnel training in the future?

    International Nuclear Information System (INIS)

    Khess, R.E.

    1996-01-01

    Problems of the NPP personnel education are discussed during radical reorganization of the state regulation of energy production and distribution when nuclear energetics will appears in the market conditions. Effective methods of the NPP personnel training developed by the corporation GPU Nuclear are given. Potentials of the application of simulators and computerized programs for increasing the NPP personnel education efficiency are considered

  12. Personnel Management theories and applications

    Institute of Scientific and Technical Information of China (English)

    Yanni Feng

    2010-01-01

    @@ 1.Introduction Many new businesses are opened in the whole world every day.Unfortunately,only a minor part of them has success and continues its activity.There is a variety of reasons which determine the hankruptcy of companies.Most of them are included in running a business,and more and more people come to realize the significance of management,especially personnel management,as personnel represents the relationship between people in the company,which is a key point for the development of enterprise.

  13. Occupational stress among police personnel in India

    Directory of Open Access Journals (Sweden)

    G Ragesh

    2017-06-01

    Full Text Available Background: Occupational stress and associated physical and mental health related issues are not addressed in Indian police personnel with adequate importance. Methods: Cross-sectional survey was conducted among police personnel (both male and female in Calicut urban police district, Kerala state, India. Police personnel from all designations (ranks, except from the all India services (Indian Police Service were included in the study. Data were collected using a specifically designed datasheet covering socio-demographic profile, physical and mental health related details which was prepared by researchers. Occupational stress was measured using Operational Police Stress Questionnaire (PSQ-OP and Organisational Police Stress Questionnaire (PSQ-ORG. Result: The study found that both operational and organisational stress was significant among the police officers. Organisational stress was experienced in moderate level by 68% and in high level by 14%. Operational stress scores were in the moderate range in 67% and in high range in 16.5%. The younger age group (21-35 years and lower level rank police personnel had higher stress. Stress was higher among female police personnel compared to males. While 23% of them had been diagnosed with physical illnesses, a significant four per cent of them with mental illness, and 29% of them reported substance abuse. Conclusion: The results point to the high level of stress among Indian police personnel and the need for urgent interventions from the government to address the occupational stress.

  14. 5 CFR 792.104 - Responsibilities of the Office of Personnel Management.

    Science.gov (United States)

    2010-01-01

    ... § 792.104 Responsibilities of the Office of Personnel Management. OPM shall provide overall leadership... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Responsibilities of the Office of Personnel Management. 792.104 Section 792.104 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT...

  15. Work performed by the nuclear industry - personnel structure and personnel requirement

    International Nuclear Information System (INIS)

    Simon, M.

    1984-01-01

    The development of the nuclear industry in the Federal Republic of Germany can be phased as follows: Phase 1 (1956-1968): initial stage, Phase 2 (1968-1975): expansion of the business volume, Phase 3 (1975-1982): decreasing business volume, more conditions and technical requirements, Phase 4 (after 1982): consolidation of technologies and project management. Accordingly, the requirements made on the personnel employed in the nuclear industry had to change. Between 1982 and today, there has been a decrease of personnel employed in nuclear industry to about 35.000. This decrease is mainly due to the supplying industry. Adding to this figure the number of people employed in research centres, authorities and experts, there are over 40.000 nuclear technology jobs, a figure which, taking into account indirect employment effect, could be in the range of 100.000 to 150.000. (orig./HSCH) [de

  16. Directory of personnel responsible for radiological health programs

    International Nuclear Information System (INIS)

    1977-01-01

    This is a directory of professional personnel who administer the radiological health program activities in state and local governmental agencies. Included in the directory is a listing of each state health officer or the head of the agency responsible for the radiological health program. The name, address, and telephone number of the radiological health personnel are listed, followed by the alternate contact who, in many instances, may be chief of a larger administrative unit of which the radiological health program is a subunit. The address for the program is also included if it differs from the official health department or agency. Generally, the titles of the personnel listed will indicate the administrative status of the radiological health program. The directory also includes a list of key professional personnel in the Bureau of Radiological Health, Radiation Operations Staff, Regional Radiological Health Representatives, Winchester Engineering and Analytical Center, Food and Drug Administration; Office of Radiation Programs, Regional Radiation Representatives, National Environmental Research Center, and Eastern Environmental Radiation Laboratory, Environmental Protection Agency; selected personnel in the U.S. Nuclear Regulatory Commission; and selected personnel in the National Bureau of Standards

  17. Monitoring of overalls and personnel skin contamination

    International Nuclear Information System (INIS)

    Turkin, N.F.

    1980-01-01

    Organization of monitoring of overalls and personnel skin contamination wastes is considered. The devices used for this purpose are enumerated. In sanitary sluices through which the personnel leaving the repair zone it is recommended to particularly thoroughly control hand skin contamination and most contaminated parts of overalls (sleeves, breeches lower parts, pockets, stomack region). In sanitary check points during personnel leaving the operator zone monitoring of overalls and skin contamination is performed. The overalls and other individual protective clothing are subjected to control in a special loundry before and after washing (decontamination) [ru

  18. Training of research reactor personnel

    International Nuclear Information System (INIS)

    Cherruau, F.

    1980-01-01

    Research reactor personnel operate the reactor and carry out the experiments. These two types of work entail different activities, and therefore different skills and competence, the number of relevant staff being basically a function of the size, complexity and versatility of the reactor. Training problems are often reactor-specific, but the present paper considers them from three different viewpoints: the training or retraining of new staff or of personnel already employed at an existing facility, and training of personnel responsible for the start-up and operation of a new reactor, according to whether local infrastructure and experience already exist or whether they have to be built up from scratch. On-the-spot experience seems to be an essential basis for sound training, but requires teaching abilities and aids often difficult to bring together, and the availability of instructors that does not always fit in smoothly with current operational and experimental tasks. (author)

  19. An independent safety assessment of Department of Energy nuclear reactor facilities: Training of operating personnel and personnel selection

    International Nuclear Information System (INIS)

    Drain, J.F.

    1981-02-01

    This study has been prepared for the Department of Energy's Nuclear Facilities Personnel Qualification and Training (NFPQT) Committee. Its purpose is to provide the Committee with background information on, and assessment of, the selection, training, and qualification of nuclear reactor operating personnel at DOE-owned facilities

  20. Training of nuclear facility personnel: boon or boondoggle

    International Nuclear Information System (INIS)

    Remick, F.J.

    1975-01-01

    The training of nuclear facility personnel has been a requirement of the reactor licensing process for over two decades. However, the training of nuclear facility personnel remains a combination of boon and boondoggle. The opportunity to develop elite, well trained, professionally aggressive reactor operation staffs is not being realized to its full potential. Improvements in the selection of personnel, training programs, operational tools and professional pride can result in improved plant operation and contribute to improved plant capacity factors. Industry, regulatory agencies, professional societies and universities can do much to improve standards and quality of the training of nuclear facility personnel and to improve the professional level of plant operation

  1. Rebuilding Iraq: DoD and State Department Have Improved Oversight and Coordination of Private Security Contractors in Iraq, but Further Actions are Needed to Sustain Improvements

    Science.gov (United States)

    2008-07-01

    MNC-I Multi-National Corps-Iraq MNF-I Multi-National Force-Iraq PSC private security contractor RSO Regional Security Office TOC tactical...maritime and territorial jurisdiction’ to include a housing complex leased by the U.S. military on a military base in Germany where a sexual assault...and monitored by RSO personnel in the RSO TOC . Motorcade vehicles are equipped with video cameras that record and document motorcade movements and

  2. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    Science.gov (United States)

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.

  3. Wireless just-in-time training of mobile skilled support personnel

    Science.gov (United States)

    Bandera, Cesar; Marsico, Michael; Rosen, Mitchel; Schlegel, Barry

    2006-05-01

    Skilled Support Personnel (SSP) serve emergency response organizations during an emergency incident, and include laborers, operating engineers, carpenters, ironworkers, sanitation workers and utility workers. SSP called to an emergency incident rarely have recent detailed training on the chemical, biological, radiological, nuclear and/or explosives (CBRNE) agents or the personal protection equipment (PPE) relevant to the incident. This increases personal risk to the SSP and mission risk at the incident site. Training for SSP has been identified as a critical need by the National Institute for Environmental Health Sciences, Worker Education and Training Program. We present a system being developed to address this SSP training shortfall by exploiting a new training paradigm called just-in-time training (JITT) made possible by advances in distance learning and cellular telephony. In addition to the current conventional training at regularly scheduled instructional events, SSP called to an emergency incident will have secure access to short (technologies and wireless service providers, integration with the incident management system, and SCORM compliance.

  4. Multi-Organizational Collaborative Public Safety and Security Planning for the 2010 Vancouver Winter Games

    Science.gov (United States)

    2012-10-01

    intermediaries bridging the gap between safety and security officials. The OCS also had the closest relationship to the three main organizations in the...a clearly shared mission and boundary-spanning personnel that are able to bridge organizational cultures and adapt to the complex challenges...commandement et contrôle) et le transfert des connaissances à partir d’événements semblables passés ou en fonction d’événements futurs. Pendant

  5. Analysis of Department of Defense social media policy and its impact on operational security

    OpenAIRE

    Leonhardi, Eric V.; Murphy, Mark; Kim, Hannah

    2015-01-01

    Approved for public release; distribution is unlimited The emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization’s operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means ...

  6. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  7. National programs for the development and development of the culture of Security in the nuclear activities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Arnau Fernandez, A.

    2003-01-01

    From their appearance, as a result of the investigations of the accident in the Nuclear Power station of Chernobyl, the term Culture of Security has been considered a key element to achieve a elevated level of security in the nuclear facilities, becoming a basic principle of security, grateful internationally. The Organ Cuban Regulator understood from very early the importance of to promote and to develop attitudes and characteristic in the organizations and the personnel linked to the nuclear sector that you/they reflected a high culture of security, for to propitiate a bigger involvement of all in the topics of security and in that way to contribute significantly to the prevention of accidents in the nuclear facilities. Although the Program Nuclear Cuban suffered serious reductions in the decade of the years 90, the Organ Regulator has continuous working in this address, assimilating all the international experience for its application in their strategies of development of the culture of security in the nuclear activities that today they are executed in the country. The present work picks up the Cuban experience in the conformation of a National Program for the development and development of the Culture of Security

  8. 45 CFR 1388.5 - Program criteria-preparation of personnel.

    Science.gov (United States)

    2010-10-01

    ..., DEVELOPMENTAL DISABILITIES PROGRAM THE UNIVERSITY AFFILIATED PROGRAMS § 1388.5 Program criteria—preparation of personnel. (a) Introduction to preparation of personnel: UAP interdisciplinary training programs reflect... 45 Public Welfare 4 2010-10-01 2010-10-01 false Program criteria-preparation of personnel. 1388.5...

  9. An On-Line Computerized Personnel-Payroll Dream.

    Science.gov (United States)

    Francis, E. E.

    1979-01-01

    Niles Township School District 219, Skokie, Illinois, has rebuilt its personnel and payroll program. The new system provides a data bank for storage of any and all information required by both the personnel and payroll departments on each district employee. (Author/MLF)

  10. Impact of Population Aging on Military and Security Policy

    Directory of Open Access Journals (Sweden)

    Martina Šimková

    2014-12-01

    Full Text Available Population ageing is among the most important problems of developed European countries and the most frequently discussed social issues. The Czech Republic also faces population ageing and we cannot expect a different trend in the future. Life expectancy has increased due to better health care while current lifestyle often leads to lower natality, resulting in a negative rate of natural increase and a decreasing proportion of young people in population in the future. This problem affects all spheres of life and social and economic development. Population ageing may pose a threat to the security of the population in different ways. The functioning of the security system may be threatened due to decreasing workforce. Population ageing may undercut resources for military budgets. Young recruits represent an important part of military forces and the latter are competing in the labour market with more attractive occupations. Especially ensuring the stability of the personnel needed for securing crisis situations would be a significant problem of near future. This paper presents a demographic perspective on staffing and correct operation of military forces in the context of population ageing. It describes the current situation of human resources in the military policy of the Czech Republic and determines the negative impact of population ageing on recruitment potential. It deals with the sustainability of human resources for security forces.

  11. Assessment of private security guards by Suicide Probability Scale and Brief Symptom Inventory.

    Science.gov (United States)

    Dogan, Bulent; Canturk, Gurol; Canturk, Nergis; Guney, Sevgi; Özcan, Ebru

    2016-01-01

    The aim of the present study was to investigate the influence of suicide probability and relevant sociodemographic features and to provide information for preventing suicide in private security guards working under the stressful conditions and continuous exposure to the negative and traumatic life events. 200 private security guards and 200 personnels of Ankara University participated in the study. A sociodemographic information questionnaire, the Suicide Probability Scale (SPS) and the Brief Symptom Inventory (BSI) were used to collect the data. Gender, marital status, income, religious beliefs, experiencing a life-threatening situation, history of a suicide attempt, smoking and not having a chronic disease caused statistically significant differences in the scores for SPS between the private security guards group and the controls. Moreover there was a statistically significant positive correlation between the total scores of the subscales of SPS and the total scores of BSI. Like police officers and gendarmes, private security guards are at high risk of committing and attempting suicide because of being at stressful work settings and also suffering from secondary trauma. It is required that they should be aware of their tendency to commit suicide and have regular psychiatric screenings.

  12. Training of nuclear power facility personnel. Part 1

    International Nuclear Information System (INIS)

    1989-06-01

    The proceedings of the conference entitled ''Training of Nuclear Power Facility Personnel'' and held in Tale, Czechoslovakia, on 24 - 27 April 1989, contain full texts of 58 contributions, 57 of which fall in the INIS subject scope. The aim of the conference was to summarize experience gained during the training and education of Czechoslovak nuclear power plants operating personnel, to put forth new suggestions for increasing the safety and reliability of nuclear power plants, and to establish the needs and new trends in the training and education of nuclear power plants personnel. The topics treated at the conference can be divided into three basic groups as follows: 1. professional qualification of nuclear power plant staff members; 2. development of technical means for the nuclear power plants personnel training; and 3. training of maintenance personnel, the system and organization of this training and education. The proceedings are published in two volumes. Part 1 contains the texts of 25 papers falling in the INIS subject scope. (Z.M.)

  13. Automatic personnel contamination monitor

    International Nuclear Information System (INIS)

    Lattin, Kenneth R.

    1978-01-01

    United Nuclear Industries, Inc. (UNI) has developed an automatic personnel contamination monitor (APCM), which uniquely combines the design features of both portal and hand and shoe monitors. In addition, this prototype system also has a number of new features, including: micro computer control and readout, nineteen large area gas flow detectors, real-time background compensation, self-checking for system failures, and card reader identification and control. UNI's experience in operating the Hanford N Reactor, located in Richland, Washington, has shown the necessity of automatically monitoring plant personnel for contamination after they have passed through the procedurally controlled radiation zones. This final check ensures that each radiation zone worker has been properly checked before leaving company controlled boundaries. Investigation of the commercially available portal and hand and shoe monitors indicated that they did not have the sensitivity or sophistication required for UNI's application, therefore, a development program was initiated, resulting in the subject monitor. Field testing shows good sensitivity to personnel contamination with the majority of alarms showing contaminants on clothing, face and head areas. In general, the APCM has sensitivity comparable to portal survey instrumentation. The inherit stand-in, walk-on feature of the APCM not only makes it easy to use, but makes it difficult to bypass. (author)

  14. 5 CFR 532.705 - Appeal to the Office of Personnel Management.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Appeal to the Office of Personnel Management. 532.705 Section 532.705 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PREVAILING RATE SYSTEMS Job Grading Reviews and Appeals § 532.705 Appeal to the Office of Personnel Management. (a)(1) An employee may...

  15. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  16. Nuclear power plant personnel training and its evaluation. A guidebook

    International Nuclear Information System (INIS)

    1996-01-01

    The Guidebook will prove especially useful for, and is addressed primarily to: nuclear power operating organizations establishing or upgrading their NPP personnel training systems; regulatory personnel responsible for setting requirements and/or evaluating NPP personnel training; and organizations (within or outside the operating organization) responsible for the development, implementation and evaluation of training programmes for NPP personnel. Figs, tabs

  17. 9 CFR 590.560 - Health and hygiene of personnel.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Health and hygiene of personnel. 590.560 Section 590.560 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF..., Processing, and Facility Requirements § 590.560 Health and hygiene of personnel. (a) Personnel facilities...

  18. Health physics personnel: a need unfulfilled

    International Nuclear Information System (INIS)

    Kathren, R.L.

    1983-01-01

    For the past decade, the demand for health physics personnel, at both the professional and technical levels, has been increasing, and indeed has become quite acute in recent years. The need for health physics personnel is demonstrated by a summary of projected requirements and potential candidates by the year 1991. Suggestions made for ensuring the availability of qualified health physics personnel includes: 1) a characterization study of health physicists should be conducted, with emphasis on industry, to determine qualifications, job satisfaction factors, and other data pertinent to entry and retention in the field; 2) the curricula currently offered by post-secondary schools should be evaluated for quality and relevance; and 3) an industry standard or protocol for qualification and training of health physics should be developed and implemented

  19. Arms, oil and security in the Gulf: a tenuous balance

    International Nuclear Information System (INIS)

    Herzog, Serge

    1999-01-01

    The GCC (Gulf Cooperation Council) countries are among the world's biggest importers of weapons. It is argued that the current policy for security i.e. awarding big defence contracts in return for Western security commitments, is untenable - the income (now falling) is better spent on improving the quality of life through increased wages, better public services and improved social programmes. Data illustrating the dependency on oil of several GCC countries are given. It is also argued that the need for high quality personnel in the weapons field starves the economy with respect to diversification demands and the need to reduce dependency on foreign labour. The military strength and defence needs of the GCC countries and the role of the western world in defending GCC countries are discussed. The potential military threat from Iran and Iraq is mentioned: it appears unlikely that the GCC would be able to cope with aggression from these two countries without outside help

  20. Scientific Openness and National Security at the National Laboratories

    Science.gov (United States)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  1. Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture

    Science.gov (United States)

    Jurčević, M.; Hegeduš, H.; Golub, M.

    2010-01-01

    Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.

  2. THE IMPORTANCE OF PERSONNEL MOTIVATION IN THE MANAGEMENT PROCESS

    Directory of Open Access Journals (Sweden)

    NĂSTASIE MIHAELA – ANDREEA

    2015-07-01

    Full Text Available General research area of this article is the motivation of personnel, essential tool in the management process, and also a component derived from human resource management. In economic activity, personnel motivation should be regarded as an internal process, not as an imperative that can be imposed from outside the economic entity. Managers of economic entities must, first, understand personnel motivation strategies, how they influence positively or negatively the internal motivations of employees. Personnel motivation by itself attracts an end, just as profitable and moral, individual and social welfare making.

  3. Save medical personnel's time by improved user interfaces.

    Science.gov (United States)

    Kindler, H

    1997-01-01

    Common objectives in the industrial countries are the improvement of quality of care, clinical effectiveness, and cost control. Cost control, in particular, has been addressed through the introduction of case mix systems for reimbursement by social-security institutions. More data is required to enable quality improvement, increases in clinical effectiveness and for juridical reasons. At first glance, this documentation effort is contradictory to cost reduction. However, integrated services for resource management based on better documentation should help to reduce costs. The clerical effort for documentation should be decreased by providing a co-operative working environment for healthcare professionals applying sophisticated human-computer interface technology. Additional services, e.g., automatic report generation, increase the efficiency of healthcare personnel. Modelling the medical work flow forms an essential prerequisite for integrated resource management services and for co-operative user interfaces. A user interface aware of the work flow provides intelligent assistance by offering the appropriate tools at the right moment. Nowadays there is a trend to client/server systems with relational databases or object-oriented databases as repository. The work flows used for controlling purposes and to steer the user interfaces must be represented in the repository.

  4. 25 CFR 38.12 - Leave system for education personnel.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Leave system for education personnel. 38.12 Section 38.12 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION EDUCATION PERSONNEL § 38.12 Leave system for education personnel. (a) Full-time school-term employees. Employees on a full-time school-term...

  5. 34 CFR 76.659 - Use of public school personnel.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Use of public school personnel. 76.659 Section 76.659... Be Met by the State and Its Subgrantees? Participation of Students Enrolled in Private Schools § 76.659 Use of public school personnel. A subgrantee may use program funds to make public personnel...

  6. Harmonious personnel scheduling

    NARCIS (Netherlands)

    Fijn van Draat, Laurens; Post, Gerhard F.; Veltman, Bart; Winkelhuijzen, Wessel

    2006-01-01

    The area of personnel scheduling is very broad. Here we focus on the ‘shift assignment problem’. Our aim is to discuss how ORTEC HARMONY handles this planning problem. In particular we go into the structure of the optimization engine in ORTEC HARMONY, which uses techniques from genetic algorithms,

  7. Nuclear security at the summer 2004 Olympic Games

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: The International Atomic Energy Agency (IAEA) today announced an unprecedented joint action plan to help ensure a high level of nuclear security at the 2004 Olympic Games. Cooperation between the IAEA, the Greek Atomic Energy Commission and the Greek Olympics Games Security Division to provide expert advice and technical assistance followed a request for assistance from the two Greek authorities to the IAEA last summer. The action plan is designed to protect facilities and materials, to detect illicit trafficking and malicious use of radioactive materials, and to ensure that emergency response forces are effective and efficient. Much of the work in Greece has been undertaken in co-operation with some IAEA Member States - with substantial support provided by the United States and France in the fields of equipment, training and technical advice. The physical protection of the Demokritos nuclear research reactor, in a suburb of Athens, has been upgraded and the security of radioactive sources used at medical and industrial facilities in six Greek cities has been tightened. Radiation detection equipment has been installed at borders and other entry points into Greece, and mobile detection equipment will be deployed elsewhere. Hand-held radiation monitors are being distributed amongst the thousands of security personnel and customs officials who are involved in the security for the Games. The equipment is being deployed to detect radioactive materials that might be used as a weapon by terrorists in a radiological dispersal device, a so-called 'dirty bomb'. Detailed information on the steps that have been taken cannot be disclosed for reasons of security. 'There has been good cooperation with the Greek Atomic Energy Commission and with the other international partners in developing and implementing this work' said Mohamed ElBaradei, Director General of the IAEA. 'We are collectively striving for a high measure of security and the work being undertaken should

  8. SAPLE: Sandia Advanced Personnel Locator Engine.

    Energy Technology Data Exchange (ETDEWEB)

    Procopio, Michael J.

    2010-04-01

    We present the Sandia Advanced Personnel Locator Engine (SAPLE) web application, a directory search application for use by Sandia National Laboratories personnel. SAPLE's purpose is to return Sandia personnel 'results' as a function of user search queries, with its mission to make it easier and faster to find people at Sandia. To accomplish this, SAPLE breaks from more traditional directory application approaches by aiming to return the correct set of results while placing minimal constraints on the user's query. Two key features form the core of SAPLE: advanced search query interpretation and inexact string matching. SAPLE's query interpretation permits the user to perform compound queries when typing into a single search field; where able, SAPLE infers the type of field that the user intends to search on based on the value of the search term. SAPLE's inexact string matching feature yields a high-quality ranking of personnel search results even when there are no exact matches to the user's query. This paper explores these two key features, describing in detail the architecture and operation of SAPLE. Finally, an extensive analysis on logged search query data taken from an 11-week sample period is presented.

  9. Return to work: Police personnel and PTSD

    NARCIS (Netherlands)

    Plat, Marie-Christine J.; Westerveld, Gre J.; Hutter, Renée C.; Olff, Miranda; Frings-Dresen, Monique H. W.; Sluiter, Judith K.

    2013-01-01

    This study i) describes the number of police personnel with PTSD who are working and those who are on sick leave before and after an out-patient-clinic treatment program and ii) examines which factors are related to return to work. Police personnel treated for PTSD (n=121). In this retrospective

  10. Personnel neutron dosimetry at Department of Energy facilities

    International Nuclear Information System (INIS)

    Brackenbush, L.W.; Endres, G.W.R.; Selby, J.M.; Vallario, E.J.

    1980-08-01

    This study assesses the state of personnel neutron dosimetry at DOE facilities. A survey of the personnel dosimetry systems in use at major DOE facilities was conducted, a literature search was made to determine recent advances in neutron dosimetry, and several dosimetry experts were interviewed. It was concluded that personnel neutron dosimeters do not meet current needs and that serious problems exist now and will increase in the future if neutron quality factors are increased and/or dose limits are lowered

  11. Civilian Personnel: Career Management

    National Research Council Canada - National Science Library

    2001-01-01

    This revision; (1) Contains changes required by the establishment of a consolidated and realigned management structure for civilian personnel, manpower, and related functions in the Office of the Assistant Secretary of the Army...

  12. 39 CFR 211.4 - Interim personnel regulations.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Interim personnel regulations. 211.4 Section 211.4... under the Postal Reorganization Act. (b) Continuation of Personnel Provisions of Former title 39, U.S.C... collective bargaining agreement under the Postal Reorganization Act, all provisions of former title 39, U.S.C...

  13. 49 CFR 1546.211 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1546.211 Section 1546... § 1546.211 Law enforcement personnel. (a) At airports within the United States not governed by part 1542...) When using a screening system required by § 1546.101(a), (b), or (c), provide for law enforcement...

  14. Security of radioactive sources in radiation facilities

    International Nuclear Information System (INIS)

    2011-03-01

    Safety codes and safety standards are formulated on the basis of internationally accepted safety criteria for design, construction and operation of specific equipment, systems, structures and components of nuclear and radiation facilities. Safety codes establish the objectives and set requirements that shall be fulfilled to provide adequate assurance for safety. Safety guides and guidelines elaborate various requirements and furnish approaches for their implementation. Safety manuals deal with specific topics and contain detailed scientific and technical information on the subject. These documents are prepared by experts in the relevant fields and are extensively reviewed by advisory committees of the Board before they are published. The documents are revised when necessary, in the light of experience and feedback from users as well as new developments in the field. In India, radiation sources are being widely used for societal benefits in industry, medical practices, research, training and agriculture. It has been reported from all over the world that unsecured radioactive sources caused serious radiological accidents involving radiation injuries and fatalities. Particular concern was expressed regarding radioactive sources that have become orphaned (not under regulatory control) or vulnerable (under weak regulatory control and about to be orphaned). There is a concern about safety and security of radioactive sources and hence the need of stringent regulatory control over the handling of the sources and their security. In view of this, this guide is prepared which gives provisions necessary to safeguard radiation installations against theft of radioactive sources and other malevolent acts that may result in radiological consequences. It is, therefore, required that the radiation sources are used safely and managed securely by only authorised personnel. This guide is intended to be used by users of radiation sources in developing the necessary security plan for

  15. Selected references on thermoluminescent dosemeters for personnel monitoring

    International Nuclear Information System (INIS)

    Lawson, Helen

    1976-08-01

    This bibliography contains references on: specific thermoluminescent dosemeters used for personnel dosimetry; comparisons of thermoluminescent and other dosemeters for personnel monitoring and read-out apparatus for thermoluminescent dosemeters. An appendix contains selected foreign language references. (author)

  16. Personnel radiation safety in nuclear power plants

    International Nuclear Information System (INIS)

    Elkert, J.

    1979-05-01

    The principal contributions to the radiation doses of the Swedish power reactor personnel are identified. The possi bilities to reduce these doses are examined. The radiation doses are analyzed according to different personnel categories, specific maintenance operations or inspections and to different radiation activities. Suggestions are given for reducing the radiation doses. (L.E.)

  17. Security robots for nuclear materials management

    International Nuclear Information System (INIS)

    Deming, R.

    1986-01-01

    Robots have successfully invaded industry where they have replaced costly personnel performing their tasks cheaper and better in most cases. There may be a place for a unique class of robots, security robots, in nuclear materials management. Robots could be employed in the functions of general response, patrol and neutralizing dangerous situations. The last is perhaps most important. Ion Track Instruments of Burlington, Massachusetts has designed an excellent unit to protect life in hazardous situations. The unit can detect, disrupt or remove explosives. It can enter dangerous areas to reconnoiter the extent of danger. It can communicate with those in a dangerous area. It can fight fires or clean an area using a 2 1/2 inch, two man hose. If necessary, it can engage an adversary in a fire fight using a twelve gauge shot gun

  18. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  19. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  20. Personality, personnel selection, and job performance

    OpenAIRE

    Linden, Dimitri; Pelt, Dirk; Dunkel, Curtis; Born, Marise

    2017-01-01

    markdownabstractJob Performance: The term job performance can either refer to the objective or subjective outcomes one achieves in a specific job (e.g., the profit of a sales persons, the number of publications of a scientist, the number of successful operations of a surgeon) or to work-related activities (e.g., writing an article, conducting specific surgical acts). In the majority of research on this topic, job performance as an outcome is used. Personnel selection: Personnel selection refe...

  1. LIPAc personnel protection system for realizing radiation licensing conditions on injector commissioning with deuteron beam

    Energy Technology Data Exchange (ETDEWEB)

    Takahashi, Hiroki, E-mail: takahashi.hiroki@jaea.go.jp [IFMIF/EVEDA Accelerator Group, Japan Atomic Energy Agency (JAEA), Rokkasho, Aomori (Japan); Narita, Takahiro; Kasugai, Atsushi [IFMIF/EVEDA Accelerator Group, Japan Atomic Energy Agency (JAEA), Rokkasho, Aomori (Japan); Kojima, Toshiyuki [Gitec Co. Ltd., Hachinohe, Aomori (Japan); Marqueta, Alvaro; Nishiyama, Koichi [IFMIF/EVEDA Project Team, Rokkasho, Aomori (Japan); Sakaki, Hironao [Quantum Beam Science Center, JAEA, Kizu, Kyoto (Japan); Gobin, Raphael [Commissariat à l’Energie Atomique et aux Energies Alternatives, CEA/Saclay, DSM/IRFU, Gif/Yvette (France)

    2016-11-01

    Highlights: • Personnel Protection System (PPS) is developed to adapt the radiation licensing. • PPS achieves the target performance to secure the personnel safety. • Pulse Duty Management System (PDMS) is developed to manage the beam-operation-time. • Satisfying performance of PDMS is confirmed by injector operation with H+ beam. • By the result of PPS and PDMS tests, the radiation license was successfully obtained. - Abstract: The performance validation of the Linear IFMIF Prototype Accelerator (LIPAc), up to the energy of 9 MeV deuteron beam with 125 mA continuous wave (CW), is planned in Rokkasho, Japan. There are three main phases of LIPAc performance validation: Injector commissioning, RFQ commissioning and LIPAc commissioning. Injector commissioning was started by H{sup +} and D{sup +} beam. To apply the radiation licensing for the Injector commissioning, the entering/leaving to/from accelerator vault should be under control, and access to the accelerator vault has to be prohibited for any person during the beam operation. The Personnel Protection System (PPS) was developed to adapt the radiation licensing conditions. The licensing requests that PPS must manage the accumulated D{sup +} current. So, to manage the overall D{sup +} beam time during injector operation, Pulse Duty Management System (PDMS) was developed as a configurable subsystem as part of the PPS. The PDMS was tested during H{sup +} beam (as simulated D{sup +}) operation, to confirm that it can handle the beam inhibit from Injector before the beam accumulation is above the threshold value specified in the radiation licensing condition. In this paper, the design and configuration of these systems and the result of the tests are presented.

  2. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  3. TLD personnel dosimetry and its relationship with the radiodiagnostic training

    International Nuclear Information System (INIS)

    Gaona, E.; Franco E, J.G.; Gaona C, E.

    2002-01-01

    The personnel dosimetry and the training in radiological protection in radiodiagnostic in Mexico before 1997 were almost nonexistent except few services of public and private radiology, we can to say that the personnel dosimetry and the obligatory training was born in the year 1997, together with the present Mexican Official Standards in radiology. This study has the purpose to make an evaluation of the personnel dosimetry of 110 radiology services distributed in the Mexican Republic for the year 2001 and to estimate the annual and bimonthly mean doses, as well as its trust intervals and its relationships with the personnel training in radiological protection by means of a sampling that was realized in two stages (1997 and 2000) in the metropolitan area of Mexico City. The results show that the received doses by the medical and technical personnel in the participating radiology services are in the 0.03 mSv and 0.94 mSv interval and the mean is 0.25 mSv. The estimated annual personnel dose would be in the 0.18 mSv to 5.64 mSv interval, which are values very lower to the annual dose limit that is 50 mSv and its magnitude is similar to the effective annual dose by natural background radiation. In the first stage in training was found that there is not a significant difference in the response frequencies among the medical and technical personnel with a p < 0.05. The 52% of the occupational exposure personnel of radiology uses dosemeter, but only 17% of them know the dose reports. the 15.8% of personnel considers that dosemeter protects against radiation and only 16.5% knows the annual maximum permissible dose for stochastic effects. The second stage, the results shown that there is a significant difference in the response of frequencies among medical and technical personnel, the same results which are obtained for members and non members of a professional association with a p < 0.05. The 38% has personnel dosimetry, the 19% knows the principles of radiological

  4. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  5. DoD Nuclear Weapons Personnel Reliability Assurance

    Science.gov (United States)

    2016-04-27

    systems, positive control material (PCM) and equipment, and special nuclear material (SNM) and subject to a nuclear weapons personnel reliability...assurance implementation guidance for consistency and compliance with this issuance. c. Conducts programmatic reviews, manages audits , and directs...personnel reliability assurance education and training materials . 2.4. ASSISTANT SECRETARY OF DEFENSE FOR HEALTH AFFAIRS (ASD(HA)). Under the authority

  6. A relational database for personnel radiation exposure management

    International Nuclear Information System (INIS)

    David, W.; Miller, P.D.

    1993-01-01

    In-house utility personnel developed a relational data base for personnel radiation exposure management computer system during a 2 1/2 year period. The (PREM) Personnel Radiation Exposure Management System was designed to meet current Nuclear Regulatory Commission (NRC) requirements related to radiological access control, Radiation Work Permits (RWP) management, automated personnel dosimetry reporting, ALARA planning and repetitive job history dose archiving. The system has been operational for the past 18 months which includes a full refueling outage at Clinton Power Station. The Radiation Protection Department designed PREM to establish a software platform for implementing future revisions to 10CFR20 in 1993. Workers acceptance of the system has been excellent. Regulatory officials have given the system high marks as a radiological tool because of the system's ability to track the entire job from start to finish

  7. The LHC personnel safety system

    International Nuclear Information System (INIS)

    Ninin, P.; Valentini, F.; Ladzinski, T.

    2011-01-01

    Large particle physics installations such as the CERN Large Hadron Collider require specific Personnel Safety Systems (PSS) to protect the personnel against the radiological and industrial hazards. In order to fulfill the French regulation in matter of nuclear installations, the principles of IEC 61508 and IEC 61513 standard are used as a methodology framework to evaluate the criticality of the installation, to design and to implement the PSS.The LHC PSS deals with the implementation of all physical barriers, access controls and interlock devices around the 27 km of underground tunnel, service zones and experimental caverns of the LHC. The system shall guarantee the absence of personnel in the LHC controlled areas during the machine operations and, on the other hand, ensure the automatic accelerator shutdown in case of any safety condition violation, such as an intrusion during beam circulation. The LHC PSS has been conceived as two separate and independent systems: the LHC Access Control System (LACS) and the LHC Access Safety System (LASS). The LACS, using off the shelf technologies, realizes all physical barriers and regulates all accesses to the underground areas by identifying users and checking their authorizations.The LASS has been designed according to the principles of the IEC 61508 and 61513 standards, starting from a risk analysis conducted on the LHC facility equipped with a standard access control system. It consists in a set of safety functions realized by a dedicated fail-safe and redundant hardware guaranteed to be of SIL3 class. The integration of various technologies combining electronics, sensors, video and operational procedures adopted to establish an efficient personnel safety system for the CERN LHC accelerator is presented in this paper. (authors)

  8. Policy for securing human resources in the nuclear industry of Japan

    International Nuclear Information System (INIS)

    Takeuchi, S.

    1993-01-01

    The shortage of human resources in the field of nuclear industry in Japan is due to: structural difficulty resulting from the prevailing labor shortage in Japan, difficulties from the ever-intensifying adverse wind against nuclear power, and difficulties specific to R and D organizations. A practical plan is proposed for securing qualified personnel: approach to be directly made on campuses; effective/advanced management of human resources; better treatment and fringe benefit; promoting the nuclear industry attractiveness; expanding the scope of basic and fundamental researches; regaining the public confidence; closer cooperation between the government and the nuclear power groups. 6 figs

  9. Training of personnel

    International Nuclear Information System (INIS)

    1997-01-01

    Selected staffs (in the area of NPPs) are examined by the State Examining Committee established by Nuclear Regulatory Authority of the Slovak Republic (NRA SR's) chairman. The committee consists of representatives of NRA SR , Bohunice NPPs, Mochovce NPP, Research Institute of Nuclear Energy and experts from the Faculty of Electrical Engineering and Information Technology of the Slovak Technical University. The review of selected personnel of NPP V-1, V-2 and Mochovce NPP which passed exams in 1996 is given. NRA SR paid attention to the upgrading training process of individual categories of staff for V-1, V-2 and Mochovce NPPs, simulator training and training with computerized simulation system according to the United criteria of nuclear installation personnel training that started in 1992. During the year, an inspection was performed focused on examination of technical equipment of the simulator of Mochovce NPP, professional eligibility and overall preparation of simulator training including simulator software. Throughout the year launching works continued at the simulator with the deadline of commissioning to trial use operation in the first half of 1997

  10. Personnel exposures in industrial radiography

    International Nuclear Information System (INIS)

    Shenoy, K.S.; Patel, P.H.

    1979-01-01

    The manifold increase in production, and ease of availability of radioisotopes in India have been responsible for a tremendous increase in use of radioisotopes in industrial radiography during past fifteen years. Among various applications of radioisotopes the industrial radiography involves a large potential risk of occupational radiation exposures. The dose records of past fifteen years in respect of all radiation workers maintained by the Personnel Monitoring Group of Division of Radiological Protection of the Bhabha Atomic Research Centre, Bombay, have been analysed. Analysis of excessive exposure (exceeding 400 mrem/fortnight) reveals that this figure is increasing at an alarming rate among the radiation workers of this category. In spite of various regulatory controls the dose per person per week has remained higher as compared to the same in other categories. This combined with the increase in number of radiation workers every year would soon contribute significantly to the per capita dose for radiation workers. Use of adequately shielded fool-proof remote control equipment and training of all personnel in safe handling of radiation sources seem to be the only solution to arrest the rate of increase in personnel exposures of this category. (auth.)

  11. Personnel economics: A research field comes of age

    DEFF Research Database (Denmark)

    Grund, Christian; Bryson, Alex; Dur, Robert

    2017-01-01

    The application of economic theory and principles to firms’ human resource problems is commonplace today. Personnel economics has come a long way since its early days in the late 1970s and 1980s, when scholars developed its theoretical foundations. In this contribution and introduction...... to the Special Issue ‘Advances in personnel economics’ of the German Journal of Human Resource Management, we would like to illustrate the origins of the field, outline how personnel economics relates to other research areas, describe major developments in the field and address its future challenges....

  12. Personnel radiation monitoring by thermoluminescence dosimetry (2000-2001)

    International Nuclear Information System (INIS)

    Mi-Cho-Cho, Daw; Hla-Hla-Win, Daw; Thin-Thin-Kraing

    2001-01-01

    Thermoluminescence dosimetry service was introduced in 1991. Personnel who exposed directly or indirectly to radiation is monitored by thermoluminescent dosimeter. TL materials used for thermoluminescent dosimeter are in the form of thin disc. Personnel whole-body and extremity doses are measured by thermoluminescence dosimetry. The Harshaw Model 4500 TLD reader and Vinten 654E TLD reader are used for TLD evaluation. At present about 600 radiation workers are provided with TLD for routine monitoring. It was found that most personnel had received within permissible dose recommended by the International Commission on Radiological Protection (ICRP). (author)

  13. Southeast Asian Perceptions of U.S. Security Policy in the Post-Cold War Era

    Science.gov (United States)

    1993-06-01

    personnel to be stationed in Singapore. Alimin’s statement came the day following Malaysia’s Defense Minister Najib Tun Razak had also declared Kuala Lumpur’s...military concerns. Malaysian Defense Minister Datuk Sri Mohamed Najib Razak has said: "The question of security should not be viewed from a narrow...region."" In November 1991, Defense Minister Najib Razak offered the use of the Royal Malaysian Naval Base in Lumut as a maintenance and repair depot for

  14. An Overview of Global Nuclear Security Regime and Its Introduction into the Nigerian Educational System

    International Nuclear Information System (INIS)

    Jonah, S.A.

    2013-01-01

    Nuclear security is the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities. The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the respective country. Within a State the nuclear security regime resembles layers of an onion with equipment and personnel securing the borders and ports representing the outer layer. Nuclear power, research reactor and nuclear medicine facilities constitute the various inner layers down to the actual target materials. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, hardware and software. Nigeria is a non-nuclear weapons state and without a large-scale nuclear industry, but have a major role to play in preventing nuclear terrorism globally. It is pertinent to know that as the Fukushima accident and other nuclear accidents have demonstrated, nuclear crises do not respect borders. Therefore, nuclear threats must be addressed by all nations. Furthermore, to set the groundwork for the safe, peaceful and stable use of nuclear energy in Nigeria and all over the world, efforts must be made to enhance nuclear safety and security. This paper discusses the present international nuclear security regime and possibility of integrating it into the Nigerian educational system in view of current global perspectives and nuclear renaissance.

  15. Stress, Sleep and Depressive Symptoms in Active Duty Military Personnel.

    Science.gov (United States)

    Chou, Han-Wei; Tzeng, Wen-Chii; Chou, Yu-Ching; Yeh, Hui-Wen; Chang, Hsin-An; Kao, Yu-Chen; Huang, San-Yuan; Yeh, Chin-Bin; Chiang, Wei-Shan; Tzeng, Nian-Sheng

    2016-08-01

    The military is a unique occupational group and, because of this, military personnel face different kinds of stress than civilian populations. Sleep problems are an example. The purpose of this study was to investigate the relationship between sleep problems, depression level and coping strategies among military personnel. In this cross-sectional study, military personnel completed the Beck Depression Inventory, the Pittsburgh Sleep Quality Index and the Jalowiec Coping Scale. An evaluation of the test scores showed that officers had better sleep quality and fewer depressive symptoms than enlisted personnel. Military personnel with higher educational levels and less physical illness also had fewer depressive symptoms. Officers and noncommissioned officers preferred problem-focused strategies. Those with higher Beck Depression Inventory and Pittsburgh Sleep Quality Index scores and those who drank alcohol frequently preferred affective-focused strategies. Our results revealed that sleep quality, physical illness and alcohol consumption were associated with the mental health of military personnel. Treating these factors may improve the mental health of military personnel and enhance effective coping strategies. Copyright © 2016 Southern Society for Clinical Investigation. Published by Elsevier Inc. All rights reserved.

  16. The safety and the security of radioactive sources

    International Nuclear Information System (INIS)

    Bhatt, B.C.; Ghosh, P.K.; Nandakumar, A.N.

    2003-01-01

    A Task Group was appointed by Chairman, AERB to review the current practice and recommend procedures for ensuring the Safety and the Security of Radioactive Sources in India. The Task Group identified the issues involved and concluded that the current regulatory procedure relating to licensing was adequate in view of the stress placed on pre-licensing requirements and the undertakings obtained from the licensee and ensuring that appropriate radiation monitors and trained personnel are available at the licensee's institution. Each licensee is required to submit periodic reports confiriming the safety and the security of the sources in the possession of the institution. It is important to conduct regulatory inspection of the institutions frequently. In order to optimise the regulatory effort involved, the report recommends frequencies of inspections commensurate with the potential hazard associated with the source. For this purpose the sources are brought under three categories which are largely based on the categorization recommended by the International Atomic Energy Agency (IAEA), Vienna with deviations introduced on the basis of rationalized hazard potential associated with the sources. The importance of technical coordination between AERB and BARC is emphasised. (author)

  17. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  18. A computer model for identifying security system upgrades

    International Nuclear Information System (INIS)

    Lamont, A.

    1988-01-01

    This paper describes a prototype safeguards analysis tool that automatically identifies system weaknesses against an insider adversary and suggest possible upgrades to improve the probability that the adversary will be detected. The tool is based on this premise: as the adversary acts, he or she creates a set of facts that can be detected by safeguards components. Whenever an adversary's planned set of actions create a set of facts which the security personnel would consider irregular or unusual, we can improve the security system by implementing safeguards that detect those facts. Therefore, an intelligent computer program can suggest upgrades to the facility if we construct a knowledge base that contains information about: (1) the facts created by each possible adversary action, (2) the facts that each possible safeguard can detect, and (3) groups of facts which will be considered irregular whenever they occur together. The authors describe the structure of the knowledge base and show how the above information can be represented in it. They also describe the procedures that a computer program can use to identify missing or weak safeguards and to suggest upgrades

  19. USA perspectives. Safety and security of radioactive sources

    International Nuclear Information System (INIS)

    Dicus, G.J.

    1999-01-01

    In contrast to the 103 licensed nuclear power plants in the United States, there are about 157,000 licenses that authorize the use of radioactive materials subject to US Atomic Energy Act. as amended. Each year the NRC receives about 200 reports of lost, stolen or abandoned radioactive sources and devices. The NRC has established a programme to review and analyze reports and other information on losses, thefts, abandonments, and discoveries of radioactive sources that helped to identify and characterize the problem with safety and security of radioactive sources in devices used under the general license programme. In summary, a large number of radioactive sources in use in the USA have a very good safety record. When used properly by trained personnel with effective regulatory oversight, the many uses of radioactive sources are safe and provide a net benefit to society. If problems occur such as overexposures or contamination of property, it is essential that hey are promptly reported to the regulatory authority. If necessary appropriate emergency response measures can be taken, and the problems analysed. In that way, effective risk-informed regulatory measures can be activated to assure the continued safety and security of radioactive sources

  20. Modernization of personnel training

    International Nuclear Information System (INIS)

    Haferburg, M.; Rehn, H.

    1997-01-01

    Personnel training in German nuclear power plants adheres to high standards complying with government regulations. The development of PC technology allows the introduction of new training methods, e.g. computer based training (CBT), as well as their integration into existing systems. In Germany, the operators of nuclear power plants have developed their own computer based standards with a screen design, a hardware platform and an assessment standard. 25% of the theoretical training of the shift personnel is covered by CBT. The CBT-Programmes offer multimedia features: videos, photographs, sound, graphs and switching diagrams of existing systems, practice oriented simulations and 3-D animations. Interaction is the most important attribute of an efficient self-learning-programme. A typical example of such an appropriate theme is the CBT-Lesson ''Pressure Surges in Pipes and Components of Power Plants''. (author)

  1. A system for measuring and processing personnel dosimetric data

    International Nuclear Information System (INIS)

    Neetzel, C.R.; Rochetti, Luis

    1981-01-01

    An operative system for the measurement and on-line processing of personnel dosimetry data is described. The aim is to organize and rationalize the work involved in a personnel dosimetry service. The method considers the application to other areas of radiation protection, as well as the connection and exchange of files among the different personnel monitoring groups. The system can be interfaced with different computers (M.E.L.) [es

  2. Systematic approach to personnel neutron monitoring

    International Nuclear Information System (INIS)

    Griffith, R.V.; Hankins, D.E.

    1980-01-01

    NTA film and albedo detectors represent the major portion of personnel dosimeters now used for occupational neutron monitoring. However, recent attention to the spectral response of these systems has demonstrated the need for detectors that have a better match to the fields being monitored. Recent developments in direct recoil track etch dosimeters present some intriguing alternatives, and careful use of 237 Np fission fragment detectors offers the advantage of a good dose equivalent spectral match. Work continues on a number of other new detector mechanisms, but problems with sensitivity, energy response, gamma interference, etc., continue to prevent development of most mechanisms into viable personnel dosimeters. Current dosimeter limitations make a systematic approach to personnel neutron monitoring particularly important. Techniques have been developed and tested, using available portable survey instruments, that significantly improve the quality of dosimeter interpretation. Even simple spectrometry can be done with modest effort, significantly improving the health physicists ability to provide accurate neutron monitoring

  3. Assessing the Personal Financial Problems of Junior Enlisted Personnel

    National Research Council Canada - National Science Library

    Buddin, Richard

    2002-01-01

    .... Surveys of military personnel show that, particularly for junior personnel, financial problems constitute a major source of stress, subordinate only to increased workload and family separation...

  4. 21 CFR 111.105 - What must quality control personnel do?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false What must quality control personnel do? 111.105..., LABELING, OR HOLDING OPERATIONS FOR DIETARY SUPPLEMENTS Production and Process Control System: Requirements for Quality Control § 111.105 What must quality control personnel do? Quality control personnel must...

  5. A Global Perspective of Vaccination of Healthcare Personnel against Measles: Systematic Review

    Science.gov (United States)

    Fiebelkorn, Amy Parker; Seward, Jane F.; Orenstein, Walter

    2015-01-01

    Measles transmission has been well documented in healthcare facilities. Healthcare personnel who are unvaccinated and who lack other evidence of measles immunity put themselves and their patients at risk for measles. We conducted a systematic literature review of measles vaccination policies and their implementation in healthcare personnel, measles seroprevalence among healthcare personnel, measles transmission and disease burden in healthcare settings, and impact/costs incurred by healthcare facilities for healthcare-associated measles transmission. Five database searches yielded 135 relevant articles; 47 additional articles were found through cross-referencing. The risk of acquiring measles is estimated to be 2 to 19 times higher for susceptible healthcare personnel than for the general population. Fifty-three articles published worldwide during 1989–2013 reported measles transmission from patients to healthcare personnel; many of the healthcare personnel were unvaccinated or had unknown vaccination status. Eighteen articles published worldwide during 1982–2013 described examples of transmission from healthcare personnel to patients or to other healthcare personnel. Half of European countries have no measles vaccine policies for healthcare personnel. There is no global policy recommendation for the vaccination of healthcare personnel against measles. Even in countries such as the United States or Finland that have national policies, the recommendations are not uniformly implemented in healthcare facilities. Measles serosusceptibility in healthcare personnel varied widely across studies (median 6.5%, range 0%-46%) but was consistently higher among younger healthcare personnel. Deficiencies in documentation of two doses of measles vaccination or other evidence of immunity among healthcare personnel presents challenges in responding to measles exposures in healthcare settings. Evaluating and containing exposures and outbreaks in healthcare settings can be

  6. Results of special security inspection on improvement of security management setup in Head Office and Tsuruga Nuclear Power Station of the Japan Atomic Power Company and improvement of facilities in Tsuruga Nuclear Power Station

    International Nuclear Information System (INIS)

    1982-01-01

    In connection with the series of accidents in the Tsuruga Nuclear Power Station, the Agency of Natural Resources and Energy had instructed JAPC to make comprehensive inspection on the security management setup and to take improvement measures in the nuclear power station. The results of the subsequent inspection by ANRE confirmed that the improvements made by JAPC are adequate, and the following items are described: improvement of security management setup - communication and reporting in emergency, the management of inspection and maintenance records, work control and supervision in repair, improvement, etc., functional authority and responsibility in maintenance management, operation management, radiation control, personnel education; improvement of facilities - feed water heaters, laundry waste-water filter room, radioactive waste treatment facility, general drainage, concentrated waste liquid storage tanks in newly-built waste treatment building, etc. (J.P.N.)

  7. Experience with training of operating and maintenance personnel of nuclear power plants

    International Nuclear Information System (INIS)

    Pospisil, M.; Cencinger, F.

    1988-01-01

    The system is described of the specialist training of personnel for Czechoslovak nuclear power plants. Training consists of basic training, vocational training and training for the respective job. Responsible for the training is the Research Institute for Nuclear Power Plants; actual training takes place at three training centres. Personnel are divided into seven categories for training purposes: senior technical and economic staff, shift leaders, whose work has immediate effect on nuclear safety, engineering and technical personnel of technical units, shift leaders of technical units, personnel in technical units, shift service personnel and operating personnel, maintenance workers. Experience with training courses run at the training centre is summed up. Since 1980 the Centre has been training personnel mainly for the Dukovany nuclear power plant. Recommendations are presented for training personnel for the Temelin nuclear power plant. (Z.M.)

  8. Personnel photographic film dosimetry

    International Nuclear Information System (INIS)

    Keirim-Markus, I.B.

    1981-01-01

    Technology of personnel photographic film dosimetry (PPD) based on the photographic effect of ionizing radiation is described briefly. Kinds of roentgen films used in PPD method are enumerated, compositions of a developer and fixing agents for these films are given [ru

  9. Nuclear Test Personnel Review

    Science.gov (United States)

    FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak

  10. Scenario-based approach to risk analysis in support of cyber security

    Energy Technology Data Exchange (ETDEWEB)

    Gertman, D. I.; Folkers, R.; Roberts, J. [Idaho National Laboratory, Roberts and Folkers Associates, LLC, Idaho Falls, ID 83404 (United States)

    2006-07-01

    The US infrastructure is continually challenged by hostile nation states and others who would do us harm. Cyber vulnerabilities and weaknesses are potential targets and are the result of years of construction and technological improvement in a world less concerned with security than is currently the case. As a result, cyber attack presents a class of challenges for which we are just beginning to prepare. What has been done in the nuclear, chemical and energy sectors as a means of anticipating and preparing for randomly occurring accidents and off-normal events is to develop scenarios as a means by which to prioritize and quantify risk and to take action. However, the number of scenarios risk analysts can develop is almost limitless. How do we ascertain which scenario has the greatest merit? One of the more important contributions of probabilistic risk analysis (PRA) has been to quantify the initiating event probability associated with various classes of accidents; and to quantify the occurrence of various conditions, i.e., end-states, as a function of these important accident sequences. Typically, various classes of conditions are represented by scenarios and are quantified in terms of cut sets and binned into end states. For example, the nuclear industry has a well-defined set of initiating events that are studied in assessing risk. The maturation of risk analysis for cyber security from accounting for barriers or looking at conditions statically to one of ascertaining the probability associated with certain events is, in part, dependent upon the adoption of a scenario-based approach. For example, scenarios take into account threats to personnel and public safety; economic damage, and compromises to major operational and safety functions. Scenarios reflect system, equipment, and component configurations as well as key human-system interactions related to event detection, diagnosis, mitigation and restoration of systems. As part of a cyber attack directed toward

  11. Scenario-based approach to risk analysis in support of cyber security

    International Nuclear Information System (INIS)

    Gertman, D. I.; Folkers, R.; Roberts, J.

    2006-01-01

    The US infrastructure is continually challenged by hostile nation states and others who would do us harm. Cyber vulnerabilities and weaknesses are potential targets and are the result of years of construction and technological improvement in a world less concerned with security than is currently the case. As a result, cyber attack presents a class of challenges for which we are just beginning to prepare. What has been done in the nuclear, chemical and energy sectors as a means of anticipating and preparing for randomly occurring accidents and off-normal events is to develop scenarios as a means by which to prioritize and quantify risk and to take action. However, the number of scenarios risk analysts can develop is almost limitless. How do we ascertain which scenario has the greatest merit? One of the more important contributions of probabilistic risk analysis (PRA) has been to quantify the initiating event probability associated with various classes of accidents; and to quantify the occurrence of various conditions, i.e., end-states, as a function of these important accident sequences. Typically, various classes of conditions are represented by scenarios and are quantified in terms of cut sets and binned into end states. For example, the nuclear industry has a well-defined set of initiating events that are studied in assessing risk. The maturation of risk analysis for cyber security from accounting for barriers or looking at conditions statically to one of ascertaining the probability associated with certain events is, in part, dependent upon the adoption of a scenario-based approach. For example, scenarios take into account threats to personnel and public safety; economic damage, and compromises to major operational and safety functions. Scenarios reflect system, equipment, and component configurations as well as key human-system interactions related to event detection, diagnosis, mitigation and restoration of systems. As part of a cyber attack directed toward

  12. Critical Uses of College Resources. Part I: Personnel Utilization System.

    Science.gov (United States)

    Vlahos, Mantha

    A Personnel Utilization System has been designed at Broward Community College, which combines payroll, personnel, course, and function information in order to determine the actual duties performed by personnel for the amount of remuneration received. Objectives of the system are (1) to define the tasks being performed by faculty, staff, and…

  13. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume contains the student guide. It contains the introduction to the course, terrorism, field search and restraints, criminal procedures, introduction to criminal law, offenses against persons and property, rules of conduct, use of force, firearms qualification course, self defense, arrest authority, civil liability, report writing, stress, and tactics

  14. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's guide, covering physical exercise, terrorism, field search and restraint, criminals procedures, introduction to criminal law, offenses against property, rules of conduct, use of force, firearms qualification, self defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  15. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's manual for the training of SNM guards. Covered are: self-defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  16. The Patient Safety Attitudes among the Operating Room Personnel

    Directory of Open Access Journals (Sweden)

    Cherdsak Iramaneerat

    2016-07-01

    Full Text Available Background: The first step in cultivating the culture of safety in the operating room is the assessment of safety culture among operating room personnel. Objective: To assess the patient safety culture of operating room personnel at the Department of Surgery, Faculty of Medicine Siriraj Hospital, and compare attitudes among different groups of personnel, and compare them with the international standards. Methods: We conducted a cross-sectional survey of safety attitudes among 396 operating room personnel, using a short form of the Safety Attitudes Questionnaire (SAQ. The SAQ employed 30 items to assess safety culture in six dimensions: teamwork climate, safety climate, stress recognition, perception of hospital management, working conditions, and job satisfaction. The subscore of each dimension was calculated and converted to a scale score with a full score of 100, where higher scores indicated better safety attitudes. Results: The response rate was 66.4%. The overall safety culture score of the operating room personnel was 65.02, higher than an international average (61.80. Operating room personnel at Siriraj Hospital had safety attitudes in teamwork climate, safety climate, and stress recognition lower than the international average, but had safety attitudes in the perception of hospital management, working conditions, and job satisfaction higher than the international average. Conclusion: The safety culture attitudes of operating room personnel at the Department of Surgery, Siriraj Hospital were comparable to international standards. The safety dimensions that Siriraj Hospital operating room should try to improve were teamwork climate, safety climate, and stress recognition.

  17. School Personnel Responses to Children Exposed to Violence

    Science.gov (United States)

    Kenemore, Thomas; Lynch, John; Mann, Kimberly; Steinhaus, Patricia; Thompson, Theodore

    2010-01-01

    Authors explored the experiences of school personnel in their responses to children's exposure to violence. Thirty-one school personnel, including administrators, teachers, counselors, school social workers, and psychologists, were interviewed to obtain data on their experiences related to violence exposure in their schools and the surrounding…

  18. Risks and health effects in operating room personnel

    NARCIS (Netherlands)

    van den Berg-Dijkmeijer, Marleen L.; Frings-Dresen, Monique H. W.; Sluiter, Judith K.

    2011-01-01

    The objective was to find the factors that pose a possible health risk to OR personnel. Work-related health problems of operating room (OR) personnel were signalled by an occupational physician and preparations for the development of new Worker's Health Surveillance (WHS) were started with a

  19. Energy response study of modified CR-39 neutron personnel dosimeter

    International Nuclear Information System (INIS)

    Sathian, Deepa; Bakshi, A.K.; Datta, D.; Nair, Sreejith S.; Sathian, V.; Mishra, Jitendra; Sen, Meghnath

    2018-01-01

    Personnel neutron dosimetry is an integral part of radiation protection. No single dosimeter provides the satisfactory energy response, sensitivity, angular dependence characteristics and accuracy necessary to meet the requirement of an ideal personnel neutron dosimeter. The response of a personnel neutron dosimeter is critically dependent upon the energy distribution of the neutron field. CR-39 personnel neutron dosimeters were typically calibrated in the standard neutron field of 252 Cf and 241 Am-Be in our laboratory, although actual neutron fields may vary from the calibration neutron spectrum. Recently the badge cassette of the personnel neutron dosimeter was changed due to frequent damage of the PVC badge used earlier. This paper discusses energy response of CR-39 solid state nuclear track detector loaded in this modified badge cassette as per latest ISO recommendation

  20. Current personnel dosimetry practices at DOE facilities

    International Nuclear Information System (INIS)

    Fix, J.J.

    1981-05-01

    Only three parameters were included in the personnel occupational exposure records by all facilities. These are employee name, social security number, and whole body dose. Approximate percentages of some other parameters included in the record systems are sex (50%), birthdate (90%), occupation (26%), previous employer radiation exposure (74%), etc. Statistical analysis of the data for such parameters as sex versus dose distribution, age versus dose distribution, cumulative lifetime dose, etc. was apparently seldom done. Less than 50% of the facilities reported having formal documentation for either the dosimeter, records system, or reader. Slightly greater than 50% of facilities reported having routine procedures in place. These are considered maximum percentages because some respondents considered computer codes as formal documentation. The repository receives data from DOE facilities regarding the (a) distribution of annual whole body doses, (b) significant internal depositions, and (c) individual doses upon termination. It is expected that numerous differences exist in the dose data submitted by the different facilities. Areas of significant differences would likely include the determination of non-measurable doses, the methods used to determine previous employer radiation dose, the methods of determining cumulative radiation dose, and assessment of internal doses. Undoubtedly, the accuracy of the different dosimetry systems, especially at low doses, is very important to the credibility of data summaries (e.g., man-rem) provided by the repository

  1. Personnel monitoring system by thermoluminescence dosimeter - a study and review

    International Nuclear Information System (INIS)

    Iyer, V.S.; Alok, M.; Chandel, B.S.

    2018-01-01

    The principle objective of personnel monitoring system is to prevent overexposure and avoid unnecessary exposure of personnel working with various sources of radiation. The adequate system of personnel monitoring must provide for the measurement. evaluation and recording of significant doses accumulated by individuals together with a recording of conditions under which these doses are received

  2. Role of the State Office for Nuclear Safety in testing special professional competence of selected personnel of nuclear facilities and selected personnel handling ionizing radiation sources

    International Nuclear Information System (INIS)

    Kovar, P.

    2003-01-01

    The laws and regulations governing the title topic are identified. The following terms are defined and their context highlighted: professional competence; special professional competence; selected personnel; requirements for selected personnel; requirements for selected personnel training; examination boards; and licensing procedure. (P.A.)

  3. Detection of Early lung Cancer Among Military Personnel (DECAMP)

    Science.gov (United States)

    2017-10-01

    Award Number: W81XWH-11-2-0161 TITLE: Detection of Early lung Cancer Among Military Personnel (DECAMP) PRINCIPAL INVESTIGATOR: Avrum E. Spira...W81XWH-11-2-0161 Detection of Early lung Cancer Among Military Personnel (DECAMP) 5b. GRANT NUMBER W81XWH-11-2-0161 5c. PROGRAM ELEMENT NUMBER 6...biomarkers found in blood, tissues, or other bodily fluids, which may be used for the early detection of lung cancer among military personnel and

  4. The training of the operation personnel

    International Nuclear Information System (INIS)

    Martin, H.D.

    1975-01-01

    A survey about training places and the volume of the training program for reactor personnel in the Federal Republic of Germany is given. Paragraph 7 of the atomic energy act, which imposes on the operators of nuclear energy plants the qualifired training of the personnel, is refered to. Positive experiences with the use of simulation equipment for training have led to the planning of a simulator-centre which is expected to be ready for operation in 1977. The versatile program of this centre is briefly reported. (ORU) [de

  5. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  6. Pulmonary function test in traffic police personnel in Pondicherry.

    Science.gov (United States)

    Pal, Pravati; John, Robert A; Dutta, T K; Pal, G K

    2010-01-01

    Traffic policemen working in the busy traffic signal areas get exposed to the vehicular emissions for years together. The fumes, chemicals and particles present in the emission are reported to be damaging to the lung functions of these individuals. Since there were no data available on the PFT parameters of traffic police personnel of Pondicherry, this study was taken up to assess the effect of traffic air pollution on their pulmonary functions. PFT parameters were recorded in age- and BMI-matched 30 traffic police personnel (study group) and 30 general police personnel (control group) of male gender. As chronic smoking is known to be a critical factor in altering lung function, PFT parameters were compared between the smokers as well as nonsmokers of both the groups. In nonsmokers, there was significant decrease in VC (P traffic police personnel compared to the general police personnel. This may be due to exposure to vehicular pollution for several hours in a day for many years causing decreased functional capacity of the lungs and chronic smoking worsens the condition.

  7. World Health Organization's Innovative Direct Disbursement Mechanism for Payment of Grassroots Immunization Personnel and Operations in Nigeria: 2004-2015.

    Science.gov (United States)

    Yehualashet, Yared G; Wadda, Alieu; Agblewonu, Koffi B; Zhema, Theophilus; Ibrahim, Al-Asi A; Corr, Alhagie; Linkins, Jennifer; Mkanda, Pascal; Vaz, Rui G; Nsubuga, Peter; Ashogbon, Daniel

    2016-05-01

    Following the 1988 World Health Assembly resolution to eradicate polio, the government of Nigeria, with support from partners, has been implementing several rounds of supplementary immunization activities (SIAs) each year. In addition to the technical requirements, the success of the polio eradication initiative depends on timely provision of adequate financial resources. Disbursement of funds for SIAs and payment of allowances to numerous vaccination personnel at the grassroots level are enormous operational challenges in a country the size of Nigeria. Upon donors' request for a transparent and effective payment mechanism, the World Health Organization (WHO), in consultation with national counterparts, created the innovative direct disbursement mechanism (DDM) in 2004. The objective of the DDM was to timely deploy operational funds at the field level and directly pay vaccination personnel allowances at the grassroots level. A detailed operational guideline for funds disbursement was developed in close consultation with central and field stakeholders. Multiyear financial resource requirements and operational budgets for every campaign were produced by an interagency-coordinated finance subcommittee. The WHO engaged a bank and an accounting firm as DDM partners to support disbursement of and accounting for the SIA funds, respectively. The 37 WHO field offices were equipped with electronic financial systems to support the DDM process, and temporary payment sites were set up to facilitate payment to vaccination personnel at the grassroots level. Coordination meetings among DDM partners were held regularly to reconcile financial records and address operational challenges. Between 2004 and 2014, DDM supported 99 polio and nonpolio vaccination campaigns, disbursing more than $370 million to about 16 million beneficiaries across 280 temporary payment sites. To mitigate security risks and reduce operational costs, the WHO and DDM partners introduced mobile payment to

  8. Personnel training at EDF's nuclear and fossil generation division and its application for the personnel of a nuclear power station abroad

    International Nuclear Information System (INIS)

    Rabouhams, J.

    1991-01-01

    Safety in nuclear power stations relies so much upon human competence that the training of the personnel has to respond to the basic need of having personnel who are competent in their job permanently available. EDF has designed, organized and managed a large volume of training in order to provide its personnel involved in the operation of nuclear power station with initial training, training, retraining and improvement within the framework of quality organization. To deal with this training in the most efficient way EDF has developed various training aids ranging from booklets to fullscope simulator or fullscope mockups which are continually updated. All EDF experience has been used to train Daya Bay nuclear power plant personnel who have been monitored throughout the training programmes. Adequate safety conduct and attitudes including the socio-cultural background have been developed during the training. The principle teaching method was shadow training in other words the transfer in situ of knowledge, know how, and conduct from an experienced engineer. (author)

  9. Personnel Audit Using a Forensic Mining Technique

    OpenAIRE

    Adesesan B. Adeyemo; Oluwafemi Oriola

    2010-01-01

    This paper applies forensic data mining to determine the true status of employees and thereafter provide useful evidences for proper administration of administrative rules in a Typical Nigerian Teaching Service. The conventional technique of personnel audit was studied and a new technique for personnel audit was modeled using Artificial Neural Networks and Decision Tree algorithms. Atwo-layer classifier architecture was modeled. The outcome of the experiment proved that Radial Basis Function ...

  10. Personnel radiation dosimetry laboratory accreditation programme for thermoluminescent dosimeters : a proposal

    International Nuclear Information System (INIS)

    Bhatt, B.C.; Srivastava, J.K.; Iyer, P.S.; Venkatraman, G.

    1993-01-01

    Accreditation for thermoluminescent dosimeters is the process of evaluating a programme intending to use TL personnel dosimeters to measure, report and record dose equivalents received by radiation workers. In order to test the technical competence for conducting personnel dosimetry service as well as to decentralize personnel monitoring service, it has been proposed by Radiological Physics Division (RPhD) to accredit some of the laboratories, in the country. The objectives of this accreditation programme are: (i) to give recognition to competent dosimetry processors, and (ii) to provide periodic evaluation of dosimetry processors, including review of internal quality assurance programme to improve the quality of personnel dosimetry processing. The scientific support for the accreditation programme will be provided by the scientific staff from Radiological Physics Division (RPhD) and Radiation Protection Services Division (RPSD). This paper describes operational and technical requirements for the Personnel Radiation Dosimetry Laboratory Accreditation Programme for Thermoluminescent Dosimeters for Personnel Dosimetry Processors. Besides, many technical documents dealing with the TL Personnel Dosimeter System have been prepared. (author). 5 refs., 2 figs

  11. Nuclear power plant personnel training process management system

    International Nuclear Information System (INIS)

    Arjona Vazquez, Orison; Venegas Bernal, Maria del Carmen; Armeteros Lopez, Ana L.

    1996-01-01

    The system in charge the management of the training process personnel from a nuclear power plant was designed taking into account all the requirements stated in the training guide for nuclear power plant personnel and their evaluation, which were prepared by the IAEA in 1995 in order to implement the SAT in the training programs for nuclear plant personnel. In the preparations of formats and elements that shape the system, account has been taken of the views expressed in such a guide, in some other bibliography that was consulted, and in the authors own opinion mainly with regard to those issues which the guide does not go deeper into

  12. The Personnel Function Today--Trends for the Future.

    Science.gov (United States)

    Cox, Arne

    The personnel function in industrial society has been marked by crisis, reappraisals, struggles for power, and guilty conscience. The profession is again under pressure; company management often questions its contribution to the solution of strategic personnel matters, while employees and their unions question its values, and wish to place its…

  13. 21 CFR 1314.35 - Training of sales personnel.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Training of sales personnel. 1314.35 Section 1314.35 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RETAIL SALE OF SCHEDULED LISTED CHEMICAL PRODUCTS Sales by Regulated Sellers § 1314.35 Training of sales personnel. Each regulated...

  14. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  15. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  16. International cooperation and security in the field of nuclear energy in Armenia

    International Nuclear Information System (INIS)

    Khachatryan, D.A.; Avagyan, A.A.; Stepanyan, V.E.

    2010-01-01

    In the report presented/discussed are the ecological-humanitarian disasters and the related policy of the international organizations, especially IAEA, NATO and others on ensuring security of vital activity of people in the sphere of energy and particularly nuclear energy. Possessing the only nuclear power station in Trans Caucasus and the store of toxic wastes of reactive fuel the Government of Armenia and the Ministry of Emergency Situations of the Republic of Armenia always take into consideration the many-sided aspects of prevention, warning about accident in energy buildings including nuclear accidents and modern response in case of occurring the latter ensuring security for ANPP personnel and the inhabitants of the settlements of the possible contingency zone. In their daily activity the workers of the Emergency Situations of the Republic of Armenia, especially those of the Armenian Rescue Service base on the experience and logistic support of international community some aspects of which are presented below

  17. Work and Risk: Perceptions of Nuclear-Power Personnel. a Study in Grounded Theory.

    Science.gov (United States)

    Fields, Claire Dewitt

    1992-01-01

    The utility industry has devoted time and money to assure personnel within nuclear power plants are informed about occupational risks. Radiation-protection training programs are designed to present information to employees about occupational radiation and protective procedures. Work -related concerns are known to create stress, affect the morale of the workforce, influence collective bargaining, and increase compensation claims. This study was designed to determine perceptions of risk among employees of nuclear power plants and identify variables that influence these perceptions. Four power plants were included in the study, one in Canada and three in the United States. Data were generated through participant observations and interviews of 350 participants during a period of 3 weeks at each plant. Data were gathered and analyzed following procedures advanced by Grounded Theory, a naturalistic methodology used in this study. Training content, information, and communication materials were additional sources of data. Findings indicated employees believed health and safety risks existed within the work environment. Perceptions of risk were influenced by training quality, the work environment, nuclear myths and images of the general public, and fears of family members. Among the three groups of workers, administration personnel, security personnel, and radiation workers, the latter identified a larger number of risks. Workers perceived radiation risks, shift work, and steam pipe ruptures as high-level concerns. Experiencing stress, making mistakes, and fear of sabotage were concerns shared among all employee groups at various levels of concern. Strategies developed by employees were used to control risk. Strategies included teamwork, humor, monitoring, avoidance, reframing, and activism. When risks were perceived as uncontrollable, the employee left the plant. A coping strategy of transferring concerns about radiological risks to nonradiological risks were uncovered in

  18. HEALTH BEHAVIOURS OF THE PERSONNEL OF PRIMARY SCHOOLS IN ANKARA

    Directory of Open Access Journals (Sweden)

    Serife AK

    2006-04-01

    Full Text Available The main purpose of study is to define the health behaviour profile of the personnel of primary schools as well as to define the topics to be given priority in health education activities. The research population consisted of all personnel of 564 primary schools in Ankara province. The study group (30 schools was estimated by cluster sampling method. The Health Behaviours Questionnaire, which consists of 47 items on health behaviours and demographic characteristics, was used for data collection. In the study, 849 school workers (67,5% female were interviewed. Teachers constituted the largest group (82,3% while the cleaning staff (7.0%, school administrators (6.3%, and other personnel (4.4% were sharing the rest in small proportions. Of the study group 41,7 % are cigarette smokers and of them 67.3% smoke every time and 11,9% sometime in school. Very few school personnel (14,8% do physical exercise regularly. Majority of school personnel (71,3% stated that they brush their teeth at least twice a day regularly. However, only 23,7% of school personnel go to have regular dental control. All results were discussed in details considering the effects of health behaviours of school personnel on students, and some recommendations were developed for health education activities in schools. [TAF Prev Med Bull 2006; 5(2.000: 83-93

  19. TO ALL MEMBERS OF THE PERSONNEL

    CERN Multimedia

    2003-01-01

    Temporary work for children of members of the personnel During the period mid-June to mid-September 2003, there will be a limited number of vacancies for temporary work at CERN (normally unskilled work of routine nature) which will be made available to children of members of the personnel (i.e. anyone holding an employment or association contract with CERN). It should be noted that candidates must be aged between 18 and 24 inclusive on the first day of the contract, and that they must have insurance cover for both illness and accident. In view of the limited number of vacancies available, no children previously appointed at CERN under this scheme can be considered. The duration of all appointments will be 4 weeks, the allowance being CHF 1582.- for this period. Application form can be obtained from Martine PLAZA, HR Division (by using the slip in the bulletin or by electronic mail to Martine.Plaza@cern.ch) or at http://cern.ch/hr-web/internal/general/HN-personnel/ Completed application forms must be returne...

  20. TO ALL MEMBERS OF THE PERSONNEL

    CERN Multimedia

    2003-01-01

    Temporary work for children of members of the personnel During the period mid-June to mid-September 2003, there will be a limited number of vacancies for temporary work at CERN (normally unskilled work of routine nature) which will be made available to children of members of the personnel (i.e. anyone holding an employment or association contract with CERN). It should be noted that candidates must be aged between 18 and 24 inclusive on the first day of the contract, and that they must have insurance cover for both illness and accident. In view of the limited number of vacancies available, no children previously appointed at CERN under this scheme can be considered. The duration of all appointments will be 4 weeks, the allowance being CHF 1582.- for this period. Application form can be obtained from Martine PLAZA, HR Division (by electronic mail to Martine.Plaza@cern.ch) or at http://cern.ch/hr-web/internal/general/HN-personnel/ Completed application forms must be returned to this service by 2 May 2003 at th...

  1. TO ALL MEMBERS OF THE PERSONNEL

    CERN Multimedia

    2003-01-01

    Temporary work for children of members of the personnel During the period mid-June to mid-September 2003, there will be a limited number of vacancies for temporary work at CERN (normally unskilled work of routine nature) which will be made available to children of members of the personnel (i.e. anyone holding an employment or association contract with CERN). It should be noted that candidates must be aged between 18 and 24 inclusive on the first day of the contract, and that they must have insurance cover for both illness and accident. In view of the limited number of vacancies available, no children previously appointed at CERN under this scheme can be considered. The duration of all appointments will be 4 weeks, the allowance being CHF 1582.- for this period. Application form can be obtained from Martine PLAZA, HR Division (by electronic mail to Martine.Plaza@cern.ch) or at http://cern.ch/hr-web/internal/general/HN-personnel/ Completed application forms must be returned to this service by 2 May 2003 at t...

  2. To all members of the personnel

    CERN Multimedia

    2005-01-01

    Temporary work for children of members of the personnel During the period mid-June to mid-September 2005, a limited number of vacancies for temporary work at CERN (normally unskilled work of a routine nature) will be available to children of members of the personnel (i.e. anyone holding an employment or association contract with CERN). It should be noted that candidates must be aged between 18 and 24 inclusive on the first day of the contract, and that they must have insurance cover for both illness and accident. In view of the limited number of vacancies available, no children having previously worked at CERN under this scheme can be considered. The duration of all appointments will be 4 weeks and the allowance for the period will be CHF 1621.- net. Candidates should apply via the HR Department's electronic recruitment system (E-rt) : http://humanresources.web.cern.ch/humanresources/internal/personnel/pmd/cr/Staff-kids-05.pdf Completed application forms must be returned to this Service by 8 April 2005 ...

  3. Annual individual doses for personnel dealing with ionizing radiation sources

    International Nuclear Information System (INIS)

    Poplavskij, K.K.

    1982-01-01

    Data on annual individual doses for personnel of national economy enterprises, research institutes, high schools, medical establishments dealing with ionizing radiation sources are presented. It is shown that radiation dose for the personnel constitutes only shares of standards established by sanitary legislation. Numeral values of individual doses of the personnel are determined by the type, character and scope of using ionizing radiation sources

  4. Licensing requirements regarding the qualification of operating personnel in nuclear power plants

    International Nuclear Information System (INIS)

    Fechner, J.B.

    1981-01-01

    The legal requirements regarding the qualifications of operating personnel in nuclear power plants in the Federal Republic of Germany are outlined as in article 7 of the Atomic Energy Act. For the responsible operating personnel the requisite competence and reliability are legally required; for subordinate personnel the law requires only the necessary knowledge. The requisite competence and the necessary knowledge have been further specified in a set of guidelines by the authorities; work on specification of reliability requirements is under way. Essential elements of the requisite competence of responsible operating personnel are their professional qualification, their safety-related knowledge, their abilities, their practical experience, and - for the responsible shift personnel - their nuclear, plant-related training as well as a written and oral examination. Requalification is indispensible for keeping the requisite competence on a level in accordance with the current state of science and technology. Facts concerning the personal reliability of the responsible operating personnel are assessed by the competent authorities on the basis of information available at other state institutions. For the responsible shift personnel, physical and psychological fitness are important factors contributing to their reliability. The necessary knowledge subordinate operating personnel must possess with respect to plant safety and safety of the personnel is assured via instruction on safety and via special briefings at the working place. Lack of safety-related knowledge has to be compensated for by assigning an experienced permanent supervisor for each activity in question. Current work on qualification of operating personnel concentrates on training, including simulator training, of responsible shift personnel. (author)

  5. Personnel Recruitment and Retention Strategies in Lagos State Civil ...

    African Journals Online (AJOL)

    Personnel Recruitment and Retention Strategies in Lagos State Civil Service of Nigeria. ... The results show that the strategy for personnel recruitment into the CS is based on mixtures of merit and political ... AJOL African Journals Online.

  6. Personnel monitoring of radiations with thermoluminescent dosemeters

    International Nuclear Information System (INIS)

    Miano, S.C.

    1987-01-01

    The basics of personnel dosimetry technics, used by the Radiologic Protetion and Assessorie Service (SAPRA) are presented, consisting on use of thermoluminescent and CaSO 4 :Dy monitors in aggregated pellets by Teflon. The characteristics of this dosemeters, relating to the sensitivity, energetic dependence, spike temperature, characteristic emission curve, decay and light effect are shown. The thermoluminescent dosemeter measure system and the personnel monitoring system are also described. (C.G.C.) [pt

  7. [Trends and perspectives in health personnel research in the Americas].

    Science.gov (United States)

    Nogueira, R P

    1985-01-01

    It is paradoxical that the lion's share (60 to 80%) of the health budgets of the countries is invested in meeting the personnel costs of the system, and yet few studies have been done to assess the production of that personnel. The importance of personnel as a basic constituent of the sector and its presence at all levels of medical care (from physicians to auxiliaries) makes it vitally important to know how it has evolved over time so that trends can be anticipated and policies guided accordingly. This work seeks to fill, at least partly, the information gap on this subject. The method by which the author has chosen to make this evaluation is to examine the published literature on health personnel, inasmuch as the situation is reflected in articles and documents on the subject. He therefore examined the general trends observed in the following specific areas: increase of personnel and medical schools, the upsurge in the international migration of physicians, changes in the pace of personnel production, emphasis on the integration of services and education, etc. After a detailed analysis of the articles in Educación médica y salud and the Index Medicus Latinoamericano classified by subjects, the author concludes that, although much has been written on health personnel, little in-depth research has been done in primary data sources, and what is done is predominantly surveys. Besides, this research is concerned essentially with the curriculum and organization of university instruction, and betrays a great concern with coverage extension and primary care and with the training and use of auxiliary personnel, planning, and continuing education.

  8. Evaluation of a real-time personnel and material tracking system

    International Nuclear Information System (INIS)

    Trujillo, A.A.; Hoover, C.E.; Garcia, B.A.

    1988-01-01

    Past experience in addressing the insider threat has led to the development of general principles for mitigating the insider threat while minimizing adverse impacts on site operations. Among the general principles developed was the requirement of a real-time personnel and material tracking system. A real-time system for personnel and material tracking will aid in mitigating the insider threat by providing critical information regarding the movement and location of personnel and material. In addition, this system can provide an early detection mechanism for potential insider actions. A system integrating Radio Frequency (RF) transmitters for real-time personnel and material tracking has been developed. This system was installed and tested in an operational environment. This test was intended to demonstrate the system's ability to successfully control access to material and areas by personnel, as well as providing information regarding the status of materials in transit and storage

  9. Personnel management and job satisfaction in academic libraries: a ...

    African Journals Online (AJOL)

    Personnel management and job satisfaction in academic libraries: a case study of ... the level of staff development, identify the motivational factors of the library personnel, ... Questionnaire was used for this research as the main data collection ...

  10. Proficiency evaluation of maintenance personnel: Training equivalency determination

    International Nuclear Information System (INIS)

    Price, W.J.

    1991-01-01

    The nuclear industry has recognized the importance of safe, quality, productive maintenance practices and has taken a number of initiatives that have generally improved maintenance programs. Because proficient maintenance practices are critical to plant safety and reliability, most plants have also recognized the need for reliable, valid testing techniques that demonstrate and assure the competence of their maintenance personnel. Until now, resource demands were too great to develop in-plant testing programs. In the past, maintenance supervisors have exempted personnel from training, using informal judgment of the employees' previous training and experience and informal observation of the employee on the job. While this procedure may have some degree of validity, it fails to provide the documentation for training equivalency that is required to satisfy the US Nuclear Regulatory Commission (NRC) regulations and Institute of Nuclear Power Operations (INPO) guidelines. To assess and demonstrate the proficiency levels of personnel, Calvert Cliffs needed to establish an objective, reliable, time-saving, and valid system to evaluate the competency levels of personnel. This was done in a joint effort with the Electric Power Research Institute

  11. Nuclear power plant personnel training and its evaluation. A guidebook. Executive summary

    International Nuclear Information System (INIS)

    1997-05-01

    The Guidebook will prove especially useful for, and is addressed primarily to: nuclear power operating organizations establishing or upgrading their NPP personnel training systems; regulatory personnel responsible for setting requirements and/or evaluating NPP personnel training; and organizations (within or outside the operating organization) responsible for the development, implementation and evaluation of training programmes for NPP personnel. Figs

  12. IAEA world survey on nuclear power plant personnel training

    International Nuclear Information System (INIS)

    1999-01-01

    Training of personnel is acknowledged to be essential for safe and reliable operation of nuclear power plants. The preparation of this TECDOC was recommended by the IAEA International Working group on Nuclear Power Plant Personnel Training and Qualification and represents a unique compilation of information including all aspects of NPP personnel training from 23 Member States and 129 training organizations. The basic aims of this survey are: to provide a worldwide overview of all aspects of NPP personnel training; to foster both national and international cooperation between organizations involved in nuclear training; to provide the means of exchange of experiences and practices in systematic approach to training (SAT). The survey provides information for each corresponding country on the: national system and organization of training; job positions for which SAT is used; training programmes for key operations, maintenance, instructor and other jobs; role of management and the regulatory body; training facilities; recommended training practices; availability of training personnel from organizations outside the country; and contact points. The three main parts of the publication are the summary, the analysis of training programmes for each job position and the analysis of training resources, and the country reports

  13. Performing personnel dosimetry investigations and records quality assurance

    International Nuclear Information System (INIS)

    Perle, S.C.

    2002-01-01

    Radiation Safety Officers (RSOs) sometimes face situations in which personnel dosimetry estimates are required after dosimeters issued to radiation workers (film or TLD badges, extremity dosimeters, etc.) are lost or damaged before processing. This article was prepared to help those involved with personnel dosimetry investigations became aquatinted with this process. A factor that contributes to the anxiety of those unfamiliar with dosimetry investigations is the lack of published guidance available in this subject. More printed resources are needed to help radiation safety professionals familiarize themselves and understand personnel dosimetry investigations. Topics discussed in this presentation include the justification of performing dosimetry investigations, recommendations on how to perform them and the advantages of performing such investigations

  14. Health care workers in danger zones: a special report on safety and security in a changing environment.

    Science.gov (United States)

    Redwood-Campbell, Lynda J; Sekhar, Sharonya N; Persaud, Christine R

    2014-10-01

    Violence against humanitarian health care workers and facilities in situations of armed conflict is a serious humanitarian problem. Targeting health care workers and destroying or looting medical facilities directly or indirectly impacts the delivery of emergency and life-saving medical assistance, often at a time when it is most needed. Attacks may be intentional or unintentional and can take a range of forms from road blockades and check points which delay or block transport, to the direct targeting of hospitals, attacks against medical personnel, suppliers, patients, and armed entry into health facilities. Lack of access to vital health care services weakens the entire health system and exacerbates existing vulnerabilities, particularly among communities of women, children, the elderly, and the disabled, or anyone else in need of urgent or chronic care. Health care workers, especially local workers, are often the target. This report reviews the work being spearheaded by the Red Cross and Red Crescent Movement on the Health Care in Danger initiative, which aims to strengthen the protections for health care workers and facilities in armed conflicts and ensure safe access for patients. This includes a review of internal reports generated from the expert workshops on a number of topics as well as a number of public sources documenting innovative coping mechanisms adopted by National Red Cross and Red Crescent Societies. The work of other organizations is also briefly examined. This is followed by a review of security mechanisms within the humanitarian sector to ensure the safety and security of health care personnel operating in armed conflicts. From the existing literature, a number of gaps have been identified with current security frameworks that need to be addressed to improve the safety of health care workers and ensure the protection and access of vulnerable populations requiring assistance. A way forward for policy, research, and practice is proposed for

  15. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  16. Severe accident testing of a personnel airlock

    International Nuclear Information System (INIS)

    Clauss, D.B.; Parks, M.B.; Julien, J.T.; Peters, S.W.

    1988-01-01

    Sandia National Laboratories (Sandia) is investigating the leakage potential of mechanical penetrations as part of a research program on containment integrity under severe accident loads for the U.S. Nuclear Regulatory Commission (NRC). Barnes et al. (1984) and Shackelford et al. (1985) identified leakage from personnel airlocks as an important failure mode of containments subject to severe accident loads. However, these studies were based on relatively simple analysis methods. The complex structural interaction between the door, gasket, and bulkhead in personnel airlocks makes analytical evaluation of leakage difficult. In order to provide data to validate methods for evaluating the leakage potential, a full-size personnel airlock was subject to simulated severe accident loads consisting of pressure and temperature up to 300 psig and 800 degrees F. The test was conducted at Chicago Bridge and Iron under contract to Sandia. The authors provide a detailed report on the test program

  17. Development and Demonstration of a Security Core Component

    Energy Technology Data Exchange (ETDEWEB)

    Turke, Andy

    2014-02-28

    normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

  18. World Health Organization's Innovative Direct Disbursement Mechanism for Payment of Grassroots Immunization Personnel and Operations in Nigeria: 2004–2015

    Science.gov (United States)

    Yehualashet, Yared G.; Wadda, Alieu; Agblewonu, Koffi B.; Zhema, Theophilus; Ibrahim, Al-asi A.; Corr, Alhagie; Linkins, Jennifer; Mkanda, Pascal; Vaz, Rui G.; Nsubuga, Peter; Ashogbon, Daniel

    2016-01-01

    Background. Following the 1988 World Health Assembly resolution to eradicate polio, the government of Nigeria, with support from partners, has been implementing several rounds of supplementary immunization activities (SIAs) each year. In addition to the technical requirements, the success of the polio eradication initiative depends on timely provision of adequate financial resources. Disbursement of funds for SIAs and payment of allowances to numerous vaccination personnel at the grassroots level are enormous operational challenges in a country the size of Nigeria. Upon donors' request for a transparent and effective payment mechanism, the World Health Organization (WHO), in consultation with national counterparts, created the innovative direct disbursement mechanism (DDM) in 2004. The objective of the DDM was to timely deploy operational funds at the field level and directly pay vaccination personnel allowances at the grassroots level. Methods. A detailed operational guideline for funds disbursement was developed in close consultation with central and field stakeholders. Multiyear financial resource requirements and operational budgets for every campaign were produced by an interagency-coordinated finance subcommittee. The WHO engaged a bank and an accounting firm as DDM partners to support disbursement of and accounting for the SIA funds, respectively. The 37 WHO field offices were equipped with electronic financial systems to support the DDM process, and temporary payment sites were set up to facilitate payment to vaccination personnel at the grassroots level. Coordination meetings among DDM partners were held regularly to reconcile financial records and address operational challenges. Results. Between 2004 and 2014, DDM supported 99 polio and nonpolio vaccination campaigns, disbursing more than $370 million to about 16 million beneficiaries across 280 temporary payment sites. To mitigate security risks and reduce operational costs, the WHO and DDM

  19. French nuclear tests: the medical follow up of Cea participating personnel

    International Nuclear Information System (INIS)

    2004-01-01

    For the personnel exposed to the risk of ionizing radiations, two types of examinations, in the aim of detecting any track of internal contamination were practiced at regular interval, at the arrival and at the departure from the site. A gamma spectrometry, and radio toxicological examination of feces and urines were practiced. furthermore, the exposed personnel received a specific film devoted to measure their external dosimetry. The same examinations were made for the local personnel and for the personnel of intervening societies. (N.C.)

  20. Basic life support and automated external defibrillator skills among ambulance personnel

    DEFF Research Database (Denmark)

    Nielsen, Anne Møller; Isbye, Dan Lou; Lippert, Freddy Knudsen

    2012-01-01

    Ambulance personnel play an essential role in the 'Chain of Survival'. The prognosis after out-of-hospital cardiac arrest was dismal on a rural Danish island and in this study we assessed the cardiopulmonary resuscitation performance of ambulance personnel on that island.......Ambulance personnel play an essential role in the 'Chain of Survival'. The prognosis after out-of-hospital cardiac arrest was dismal on a rural Danish island and in this study we assessed the cardiopulmonary resuscitation performance of ambulance personnel on that island....

  1. Training of personnel for nuclear power in Ceske Energeticke Zavody Concern

    International Nuclear Information System (INIS)

    Hodny, J.; Krestan, J.

    1983-01-01

    The projects of training of personnel and recruitment of apprentices have to be started 10 years prior to the commissioning of a nuclear power plant. Training starts three years prior to the physical start-up. The education and training of personnel in the nuclear programme including the implementation of their social background is an equivalent component of nuclear safety. The most important aspects are presented of personnel training with regard to organization, recruitment, theoretical and practical education and training, material and technical provisions and social programme. At present personnel training and the education of specialists have reached a high standard but the problem of social care of personnel in future plants is serious and has not been solved. (M.D.)

  2. Personnel Safety for Future Magnetic Fusion Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee Cadwallader

    2009-07-01

    The safety of personnel at existing fusion experiments is an important concern that requires diligence. Looking to the future, fusion experiments will continue to increase in power and operating time until steady state power plants are achieved; this causes increased concern for personnel safety. This paper addresses four important aspects of personnel safety in the present and extrapolates these aspects to future power plants. The four aspects are personnel exposure to ionizing radiation, chemicals, magnetic fields, and radiofrequency (RF) energy. Ionizing radiation safety is treated well for present and near-term experiments by the use of proven techniques from other nuclear endeavors. There is documentation that suggests decreasing the annual ionizing radiation exposure limits that have remained constant for several decades. Many chemicals are used in fusion research, for parts cleaning, as use as coolants, cooling water cleanliness control, lubrication, and other needs. In present fusion experiments, a typical chemical laboratory safety program, such as those instituted in most industrialized countries, is effective in protecting personnel from chemical exposures. As fusion facilities grow in complexity, the chemical safety program must transition from a laboratory scale to an industrial scale program that addresses chemical use in larger quantity. It is also noted that allowable chemical exposure concentrations for workers have decreased over time and, in some cases, now pose more stringent exposure limits than those for ionizing radiation. Allowable chemical exposure concentrations have been the fastest changing occupational exposure values in the last thirty years. The trend of more restrictive chemical exposure regulations is expected to continue into the future. Other issues of safety importance are magnetic field exposure and RF energy exposure. Magnetic field exposure limits are consensus values adopted as best practices for worker safety; a typical

  3. Personnel Safety for Future Magnetic Fusion Power Plants

    International Nuclear Information System (INIS)

    Cadwallader, Lee

    2009-01-01

    The safety of personnel at existing fusion experiments is an important concern that requires diligence. Looking to the future, fusion experiments will continue to increase in power and operating time until steady state power plants are achieved; this causes increased concern for personnel safety. This paper addresses four important aspects of personnel safety in the present and extrapolates these aspects to future power plants. The four aspects are personnel exposure to ionizing radiation, chemicals, magnetic fields, and radiofrequency (RF) energy. Ionizing radiation safety is treated well for present and near-term experiments by the use of proven techniques from other nuclear endeavors. There is documentation that suggests decreasing the annual ionizing radiation exposure limits that have remained constant for several decades. Many chemicals are used in fusion research, for parts cleaning, as use as coolants, cooling water cleanliness control, lubrication, and other needs. In present fusion experiments, a typical chemical laboratory safety program, such as those instituted in most industrialized countries, is effective in protecting personnel from chemical exposures. As fusion facilities grow in complexity, the chemical safety program must transition from a laboratory scale to an industrial scale program that addresses chemical use in larger quantity. It is also noted that allowable chemical exposure concentrations for workers have decreased over time and, in some cases, now pose more stringent exposure limits than those for ionizing radiation. Allowable chemical exposure concentrations have been the fastest changing occupational exposure values in the last thirty years. The trend of more restrictive chemical exposure regulations is expected to continue into the future. Other issues of safety importance are magnetic field exposure and RF energy exposure. Magnetic field exposure limits are consensus values adopted as best practices for worker safety; a typical

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. 5 CFR 9701.410 - DHS responsibilities.

    Science.gov (United States)

    2010-01-01

    ... 5 U.S.C. chapter 23 that set forth the merit system principles and prohibited personnel practices... 9701.410 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN...

  6. Demands on power plant personnel and personnel organisation from the authorities' point of view

    International Nuclear Information System (INIS)

    Pfaffelhuber, J.K.

    1980-01-01

    A survey is given about those essential aspects of qualification and organization of personnel in nuclear power plants, that are already regulated in laws or guidelines. The considerations of the BMI concerning further developments of these requirements are outlined. (orig.) [de

  7. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  8. 5 CFR 250.202 - Office of Personnel Management responsibilities.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS PERSONNEL MANAGEMENT IN AGENCIES Strategic Human Capital Management § 250.202 Office of Personnel... to which human capital management strategies are integrated into agency strategic plans and..., managers and human resources officers accountable for efficient and effective human capital management, in...

  9. 18 CFR 701.79 - Selection policy for professional personnel.

    Science.gov (United States)

    2010-04-01

    ... following criteria: (a) Outstanding character and competence—both personal and professional. (b) Spread and... professional personnel. 701.79 Section 701.79 Conservation of Power and Water Resources WATER RESOURCES COUNCIL COUNCIL ORGANIZATION Headquarters Organization § 701.79 Selection policy for professional personnel. In...

  10. Energy Requirements of Military Personnel

    National Research Council Canada - National Science Library

    Tharion, William J; Lieberman, Harris R; Montain, Scott J; Young, Andrew J; Baker-Fulco, Carol J

    2005-01-01

    ...) have been measured while training under various conditions. Group mean total energy expenditures for 424 male military personnel from various units engaged in diverse missions ranged from 13.0 to 29.8 MJ per day...

  11. Calibration of instrument and personnel monitoring in radiological protection

    International Nuclear Information System (INIS)

    Abdul Aziz Mohamad Ramli; Wan Saffiey Wan Abdullah

    1987-01-01

    It is difficult to choose radioprotection equipments that are not too expensive and suit the purpose. Some of the dosimetric characteristics of good dosemeters outlined by ISO 4071-1978 (E) namely scale linearity, energy dependence, radiation quality dependence and angular dependence for some of the commercially available dosemeters are discussed. The calibration procedures practised at the National Secondary Standard Dosimetry Laboratory (SSDL), of the Nuclear Energy Unit (NEU) is also explained. The radiological equipments for personnel monitoring such as film badge and TLD are widely used to estimate the radiation dose delivered to the whole or partial body of a personnel. Both of the personnel monitoring procedures have been established at the NEU. The objective, use and maintenance of the devices are also discussed in detail. The evaluation of the monthly dose received by a personnel from various establishments in the country are also presented. (author). 17 figs

  12. Education in logistics and training of non-logistic personnel

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2011-01-01

    Full Text Available The significance of education in logistics and education and training of cadets who belong to non-logistic services (non-logistic personnel will be presented. The logistical aspects of education of non-logistic personnel are elaborated as well as the knowledge in the area of logistics which is necessary to be transferred through the educational process to non-logistic personnel for the successful accomplishment of their functional duties. A general approach and the methods of logistics education and improvement of non-logistic personnel are presented as well as the institutional prerequisites necessary for improving the quality of logistics education and training. The quality of the knowledge in this area and its implementation into the methods of thinking and decision making of non-logistic personnel affect the cooperation between the non-logistic and the logistic personnel, directly contributing to the quality of life and working conditions of units and institutions as well as to the quality and synergy in task accomplishments in the framework defined by the missions of the Army of Serbia. The necessary content and means of its transfer to cadets are discussed since they are supposed to be available at all levels and forms of education, depending on the previous cadet education levels. The theoretical bases and experiences shown are of general character and they have a universal application in the process of education. Introduction In our recent defense theory and operational practice, logistics education of non-logistic personnel is not sufficiently analyzed either in organizational or technological aspects, considering the concept and the logic of a systematic and a situational approach. The analysis of the experiences gained from operational practice shows a slight decrease in the quality of task accomplishment due to the lack of necessary logistic knowledge and habits as well as an increased communication gap between logistic and non

  13. Experience from training of personnel abroad

    International Nuclear Information System (INIS)

    Otcenasek, P.

    1983-01-01

    In the first period of the development of nuclear technology specialists received mainly theoretical training in brief study courses and training sessions. These courses did not place high demands on training methods. In the subsequent period long-term, well-conceived and costly systems of training were developed placing emphasis on specialized knowledge and especially on practical training. The third stage has now been launched which is characterized by the departure from classical control rooms to data collection and processing in centralized information systems, selective recording according to situation and choice, etc. This stage is passing on to the system of the minimization of the human factor error. A significant problem of the human factor in nuclear technology is the time aspect. Schools specializing in the education and training of specialists, technical personnel and workers for the nuclear programme have been established. Following such education personnel are selected for specialized training in training centres which have been equipped with costly training equipment including simulators. With regard to the importance of the human factor in nuclear installations, control computers are being introduced to an increasing extent and individuals and groups of workers and personnel are trained in operation. (E.S.)

  14. Requirements on qualification, competence and sufficient number of personnel for NPP operation

    International Nuclear Information System (INIS)

    Simon, M.

    2004-01-01

    The safe operation of NPPs presupposes qualified personnel on site in sufficient numbers. While the acquisition and preservation of technical expertise and the qualification of the shift personnel and other staff is well regulated by regulatory guidelines in Germany, there is a lack of such regulations with the exception for shift personnel - for the minimum number of technical personnel required for safe operation of a NPP. By order of the BMU, an attempt was made with this study to work out the requirements for qualification, competence and number of personnel to be maintained at the plant, representing the minimum requirements for safe operation of a NPP. The scope of the project was restricted to requirements for technical plant personnel. The aim was to work out requirements which would be as independent as possible of the existing organisation in a particular power plant. This study therefore does not assume a given organisational structure but was rather more oriented on the work processes in a NPP which are the basis for planning and performing routine work in the plant. For the study a work process model of typical tasks in a NPP had to be developed. Then, the tasks to be performed within the so defined work processes were described (task profiles) on the basis of existing manuals for plant organisation. From these task profiles such tasks were defined or selected which shall not be delegated to external personnel for specific reasons, and which were called vital competences. To keep these vital competences at the plant, an assessment and/or calculation of the necessary number of plant technical personnel was made using the task profiles for responsible personnel, but also by the evaluation of thousands of work orders for maintenance personnel. On the basis of these data, a proposal was made for the minimal number of technical personnel which is necessary to operate a NPP unit safely. Beside of this number, general criteria were developed which should be

  15. Role and responsibilities of management in NPP personnel training and competence. Working material

    International Nuclear Information System (INIS)

    1994-01-01

    The main aim and result of this seminar was imparting knowledge to various levels of Paks NPP management on their special tasks and responsibilities to achieve personnel competence, which include: meeting relevant regulatory and other requirements; defining the qualifications for NPP personnel jobs; training using systematic approach to training to attain the required level of qualification and competence of all NPP personnel, which includes management, operations, maintenance and technical support personnel and others; recruiting and retaining qualified personnel, including career development; supporting the training of all personnel on their responsibilities for introducing, maintaining and improving safety. Refs, figs and tabs

  16. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis...DoD Identity Management Capability Enterprise Services Application (IMESA) Access to FBI National Crime Information Center (NCIC) Files,” April 22...Coordinates with: (1) The USD(I) for oversight and maintenance responsibilities, and for changes to digital DoD personnel identity data and

  17. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  18. From personnel dose to personal dose

    International Nuclear Information System (INIS)

    Hoefert, M.; Raffnsoe, R.C.; Tuyn, J.W.N.; Wittekind, D.

    1985-01-01

    From following the development of personnel doses at CERN over the past six years it has become evident that work in areas of induced radioactivity is the principal cause of exposure. The results of photon dose measurements free-in-air and around a phantom are presented and discussed in the light of new quantities in individual monitoring. The importance of these results, with respect to the practical situation, is discussed and the problem of phantom size is mentioned. Finally, the results of dose measurements in the phantom are presented, since such information is important in cases where it becomes necessary to transform personnel doses into personal doses. (author)

  19. Ensuring the security and privacy of information in mobile health-care communication systems

    Directory of Open Access Journals (Sweden)

    Ademola P. Abidoye

    2011-09-01

    Full Text Available The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. Mobile communication has enabled medical consultancy, treatment, drug administration and the provision of laboratory results to take place outside the hospital. With the implementation of electronic patient records and the Internet and Intranets, medical information sharing amongst relevant health-care providers was made possible. But the vital issue in this method of information sharing is security: the patient’s privacy, as well as the confidentiality and integrity of the health-care information system, should not be compromised. We examine various ways of ensuring the security and privacy of a patient’s electronic medical information in order to ensure the integrity and confidentiality of the information.

  20. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  1. New Employee Orientation, Division of Personnel and Labor Relations,

    Science.gov (United States)

    understanding work rules and procedures, provide you with the resources you need, as well as guide you through Employee Training Exit Survey HR Forms New Employee Orientation For Admin Staff Classification Form Packets Personnel Memoranda Personnel Rules Policies and Procedures Recruitment Services Reports Sections Director's

  2. Principles for enhancing professionalism of nuclear personnel

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1989-03-01

    The management principles in this publication were developed by a committee of senior utility officials with assistance by the staff of the Institute of Nuclear Power Operations (INPO) and with input from virtually all U.S. nuclear utilities. The principles are aimed at creating an environment within a nuclear power plant that promotes a healthy respect for the unique technology that nuclear electric power represents and, thus, to promote great care and conservative, thoughtful decision-making by the nuclear plant staff. The scope of the principles includes all nuclear personnel and gives guidance in the selection and development of management and supervisory personnel and other key individuals in the areas of operations, maintenance, technical support and engineering. Utility managers are encouraged to make in-depth comparisons between these principles and their day-to-day policies and practices, and to use such efforts as opportunities to communicate their organization's management philosophy to all nuclear personnel.

  3. Principles for enhancing professionalism of nuclear personnel

    International Nuclear Information System (INIS)

    1989-01-01

    The management principles in this publication were developed by a committee of senior utility officials with assistance by the staff of the Institute of Nuclear Power Operations (INPO) and with input from virtually all U.S. nuclear utilities. The principles are aimed at creating an environment within a nuclear power plant that promotes a healthy respect for the unique technology that nuclear electric power represents and, thus, to promote great care and conservative, thoughtful decision-making by the nuclear plant staff. The scope of the principles includes all nuclear personnel and gives guidance in the selection and development of management and supervisory personnel and other key individuals in the areas of operations, maintenance, technical support and engineering. Utility managers are encouraged to make in-depth comparisons between these principles and their day-to-day policies and practices, and to use such efforts as opportunities to communicate their organization's management philosophy to all nuclear personnel

  4. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  5. Certification of Canadian nuclear power plant personnel

    International Nuclear Information System (INIS)

    Newbury, F.

    2014-01-01

    The Canadian Nuclear Safety Commission (CNSC) regulates the use of nuclear energy and materials to protect health, safety, security of Canadians and the environment, and to implement Canada's international commitments on the peaceful use of nuclear energy. As part of its mandate, the CNSC requires certification of those who work in positions with direct impact on the safety of Canadian nuclear power plants (NPPs) and research reactors. Other positions, such as exposure device operators and radiation safety officers at other nuclear facilities, also require CNSC certification. In this paper, the certification process of Canadian NPP personnel will be examined. In keeping with the CNSC's regulatory philosophy and international practice, licensees bear the primary responsibility for the safe operation of their NPPs. They are therefore held entirely responsible for training and testing their workers, in accordance with applicable regulatory requirements, to ensure they are fully qualified to perform their duties. The CNSC obtains assurance that all persons it certifies are qualified to carry out their respective duties. It achieves this by overseeing a regime of licensee training programs and certification examinations, which are based on a combination of appropriate regulatory guidance and compliance activities. Reviews of the knowledge-based certification examination methodology and of lessons learned from Fukushima have generated initiatives to further strengthen the CNSC's certification programs for NPP workers. Two of those initiatives are discussed in this paper. (author)

  6. 3. national conference on training of personnel for nuclear power

    International Nuclear Information System (INIS)

    Jacko, J.

    1983-01-01

    A national conference with international participation was held in Podbanske to evaluate the results and experiences with the training of personnel for nuclear power in training centres of the sector of fuel and energy, within the educational system and at other workplaces. The rational development of the system of personnel training must contribute towards reducing the hazards of nuclear power caused by the human factor. The results and experiences were evaluated gained in the process of the unified system of training personnel for nuclear power plants, namely training centres of various institutions, institutions of higher education and in-operation training of personnel. In 1984, the first Czechoslovak simulator of a WWER 440 unit will be put into operation. (M.D.)

  7. 48 CFR 2452.237-75 - Clearance of contractor personnel.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Clearance of contractor... Clauses 2452.237-75 Clearance of contractor personnel. As prescribed in 2437.110(e), insert the following clause in solicitations and contracts. Clearance of Contractor Personnel (OCT 1999) (a) General. This...

  8. Regionalizing the Recruitment of Health Personnel in Burkina Faso ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Human resources are essential to attaining the objectives of the Millennium development goals with respect to national health systems. In low-income countries, human health resources are characterized by a deficit of qualified personnel and an unequal distribution of existing personnel. To address these problems, the ...

  9. Motivational Monitoring as a Tool of Managing Fluctuation of Personnel

    OpenAIRE

    Darchenko Nataliya D.

    2013-01-01

    The goal of the article lies in the study of a possibility to manage fluctuation of personnel at a modern enterprise through application of the motivational monitoring and in identification of some methodical aspects of formation of the system of monitoring the fluctuation of personnel. The article considers the essence, tasks and main directions of motivational monitoring at an enterprise and offers its classification. It proves urgency of the problem of fluctuation of personnel at enterpris...

  10. 21 CFR 212.10 - What personnel and resources must I have?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false What personnel and resources must I have? 212.10 Section 212.10 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES.... 12-12-2011) Personnel and Resources § 212.10 What personnel and resources must I have? You must have...

  11. Department of Defense Civilian Personnel Manual

    National Research Council Canada - National Science Library

    1996-01-01

    .... It implements policy, establishes uniform DoD-wide procedures, provides guidelines and model programs, delegates authority, and assigns responsibilities regarding civilian personnel management within...

  12. Quo vadis, personnel monitoring

    International Nuclear Information System (INIS)

    Becker, K.

    1975-01-01

    With the increasing use of nuclear power and radiation sources, the selection of optimum systems for personnel monitoring is becoming a matter of worldwide concern. The present status of personnel dosimetry, sometimes characterized by unstable and inaccurate detectors and oversimplified interpretation of the results, leaves much to be desired. In particular, photographic film, although having certain advantages with regard to economics and information content, undergoes rapid changes in warm and humid climates. Careful sealing reduces, but does not prevent, these problems. The replacement of film by solid-state dosimeters, primarily thermoluminescence dosimeters, is in progress or being considered by an increasing number of institutions and requires a number of decisions concerning the choice of the optimum detector(s), badge design, and evaluation system; organizational matters, such as the desirability of automation and computerized bookkeeping; etc. The change also implies the potential use of such advanced concepts as different detectors and monitoring periods for the large number of low-risk persons and the small number of high-risk radiation workers. (auth)

  13. The use of film badges for personnel monitoring

    International Nuclear Information System (INIS)

    Ehrlich, M.

    1962-01-01

    Photographic film is fairly inexpensive and durable and as a result of irradiation its radiosensitive components undergo relatively permanent changes. With proper calibration the optical density of the development and fixed photographic film can be related to radiation exposure. Personnel monitoring with photographic film is the method of choice in many laboratories, and this manual gives guidelines for the use of photographic film in personnel dosimetry.

  14. Training of nuclear power plant personnel in Canada

    International Nuclear Information System (INIS)

    Tennant, D.

    1993-01-01

    All of the utilities, Ontario Hydro, Hydro Quebec and New Brunswick Power, operating Nuclear Power Plants in Canada have Training Centres which provide training for all of their plant personnel whose job activities could affect plant and personnel safety. This report points out the methods used for training, which generally conform to that described by the IAEA as a Systematic Approach to Training (SAT)

  15. THE ROLE OF THE INNOVATION POTENTIAL IN THE MANAGEMENT SYSTEM OF ECONOMIC SECURITY OF ENTERPRISES

    Directory of Open Access Journals (Sweden)

    Y. P. Anisimov

    2015-01-01

    Full Text Available The article explores the theoretical foundations of innovative potential of the enterprise and its role for sustainable development and economic security. The urgency of the problem of sustainable development innovative capacity, low level of theoretical and practical elaboration, poor methodological and conceptual basis for the development of economic security, increasing competitiveness and strengthening market situation of enterprises, determined the choice of the research topic. Scientific awareness of the key problems of the economy determined the significance of the research topic, the relevance of which is determined by the need for new theoretical concepts, methodological developments and practical recommendations on the role of innovation potential in the management system of economic security of enterprises. The system of economic security management is the basis of the successful functioning and development of enterprises. In market conditions, the economic security of organizations is directly outside-the implementation of innovations into the production process, which is an effective means of increasing competitiveness, improving the quality of products. The innovative capacity of enterprises consists of a unique ability to increase such components as material and investment, information, personnel that will help the organization to achieve new strategic goals. It should be noted that not all products are offered by organizations on the existing market, generates potential, but only one that is potentially profitable. That is, the products created on the basis of innovative technologies, from-while a high quality and should demand amongst consumers. Economic security policy is a system of views, different measures, methods of solutions, specific actions in the area of economic security, which determine the conditions for achieving business goals. Thus, the implemented security policy allocates the organization to carry out economic

  16. 5 CFR 9701.519 - Negotiation impasses.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Negotiation impasses. 9701.519 Section 9701.519 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management...

  17. The Livermore Security Console system

    International Nuclear Information System (INIS)

    Smart, J.A.

    1987-01-01

    The Console system contains multiple, redundant workstations that enable operator to monitor alarms, assess incidents, and dispatch field personnel. Each workstation is heavily computerized and incorporates automatic video switching and recording, integrated radio and telephone communications, and an advanced high-resolution map and incident-display system. Operation of the workstation is closely integrated with the map display system, allowing an operators to readily pan and zoom. Objects of security interest are overlaid on the map using color. Access to alarm sensor information, entry-control device status, and the closed-circuit television system is obtained by zooming into an area and selecting the appropriate icons or symbols on the maps. Control menus are overlaid on the map. Several large databases have been closely integrated with the map display system, providing access to information such as telephone numbers and building or room occupants. An expert system is currently being integrated with the map display system. Object state changes are interpreted by a rule-based inference engine. Incidents are overlaid on the map

  18. Prospects and challenges for new security arrangements in the Asia-Pacific region

    International Nuclear Information System (INIS)

    Hong, Mark

    1992-01-01

    The topics covered in this presentation are as follows: prospects and challenges for arms limitations; cooperation for new regional security arrangements; role of the United nations in conflict prevention, peace-keeping and disarmament. Developments in former Soviet Union which create concern are: the possible dispersion of Russian nuclear expertise and personnel to would be nuclear powers; the continuing friction between Russia and Ukraine over disposal of ex-Soviet ICBMs and tactical nuclear weapons, and the transfer to Russia of 3000 nuclear warheads in Ukraine; the Black Sea fleet, and the Crimea question. These dramatic events have global as well as regional impact as Russia is an Asia-Pacific Country

  19. Automated Scheduling of Personnel to Staff Operations for the Mars Science Laboratory

    Science.gov (United States)

    Knight, Russell; Mishkin, Andrew; Allbaugh, Alicia

    2014-01-01

    Leveraging previous work on scheduling personnel for space mission operations, we have adapted ASPEN (Activity Scheduling and Planning Environment) [1] to the domain of scheduling personnel for operations of the Mars Science Laboratory. Automated scheduling of personnel is not new. We compare our representations to a sampling of employee scheduling systems available with respect to desired features. We described the constraints required by MSL personnel schedulers and how each is handled by the scheduling algorithm.

  20. Personnel selection and emotional stability certification: establishing a false negative error rate when clinical interviews

    International Nuclear Information System (INIS)

    Berghausen, P.E. Jr.

    1987-01-01

    The security plans of nuclear plants generally require that all personnel who are to have unescorted access to protected areas or vital islands be screened for emotional instability. Screening typically consists of first administering the MMPI and then conducting a clinical interview. Interviews-by-exception protocols provide for only those employees to be interviewed who have some indications of psychopathology in their MMPI results. A problem arises when the indications are not readily apparent: False negatives are likely to occur, resulting in employees being erroneously granted unescorted access. The present paper describes the development of a predictive equation which permits accurate identification, via analysis of MMPI results, of those employees who are most in need of being interviewed. The predictive equation also permits knowing probably maximum false negative error rates when a given percentage of employees is interviewed