WorldWideScience

Sample records for security personnel

  1. Employment of security personnel

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. In his comments, W. Hunold accedes to the court's decision and discusses the underlying reasons of this decision and of a previous ruling in the same matter by putting emphasis on the difference between a contract for services and a contract for work, and a contract for temporary employment. The author also discusses the basic features of an employment contract. (orig./HP) [de

  2. Site security personnel training manual

    International Nuclear Information System (INIS)

    1978-10-01

    As required by 10 CFR Part 73, this training manual provides guidance to assist licensees in the development of security personnel training and qualifications programs. The information contained in the manual typifies the level and scope of training for personnel assigned to perform security related tasks and job duties associated with the protection of nuclear fuel cycle facilities and nuclear power reactors

  3. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  4. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    Objective of this manual is to train security personnel to protect special nuclear materials and nuclear facilities against theft and sabotage as required by 10 CFR Part 73. This volume contains the introduction and rationale

  5. 76 FR 81359 - National Security Personnel System

    Science.gov (United States)

    2011-12-28

    ... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization... National Security Personnel System (NSPS) in regulations jointly prescribed by DOD and OPM (Office of...

  6. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  7. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  8. Education and training for security personnel

    International Nuclear Information System (INIS)

    Chida, Toshiya

    2015-01-01

    It is said that Physical Protection (PP) has two purposes. One is to prevent from occurring risks of threat and terrorism and the other is to minimize damages which will be happened in case of unusual conditions or emergency situation. To achieve this goal, personnel who perform their duties should have professional knowledge and skills concerning security. However, since newcomers rarely satisfy their knowledge and skill for nuclear security in most cases. Therefore, we have to provide adequate education and training after they joined to our company. To this end, our company, located in Aomori Prefecture focused on security and physical protection for nuclear related facilities. In this paper, personnel training and challenges in order to bring up security personnel at our company will be introduced. (author)

  9. 32 CFR 154.42 - Evaluation of personnel security information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  10. Investigation of Shift Work Disorders among Security Personnel

    OpenAIRE

    Zahra Zamanian; Mansooreh Dehghani; Heidar Mohammady; Mohammadtaghi Rezaeiani; Hadi Daneshmandi

    2012-01-01

    In today’s advanced world resulting from the improvement of technology, societies tend to encounter a large number of problems and accidents. As we know, university’s security personnel are classified as shift workers and are exposed to health disturbing factors. The aim of this study was investigation of shiftwork disorders among security personnel of the hospitals Affiliated to Shiraz University of Medical Sciences, Central. This case-control study was conducted among 130 security personnel...

  11. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  12. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  13. Improving Mental Health Reporting Practices in Between Personnel Security Investigations

    Science.gov (United States)

    2017-06-01

    derogatory information, unfavorable administrative actions, and adverse actions to the appropriate personnel security, human resources , and...national security clearance? What type of clearances do people typically have (e.g., Secret, Top Secret, TS/SCI, SAP , etc.)? (2) Does [the

  14. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  15. Security personnel training using a computer-based game

    International Nuclear Information System (INIS)

    Ralph, J.; Bickner, L.

    1987-01-01

    Security personnel training is an integral part of a total physical security program, and is essential in enabling security personnel to perform their function effectively. Several training tools are currently available for use by security supervisors, including: textbook study, classroom instruction, and live simulations. However, due to shortcomings inherent in each of these tools, a need exists for the development of low-cost alternative training methods. This paper discusses one such alternative: a computer-based, game-type security training system. This system would be based on a personal computer with high-resolution graphics. Key features of this system include: a high degree of realism; flexibility in use and maintenance; high trainee motivation; and low cost

  16. Forecasting the Demand for Information Security Personnel

    Directory of Open Access Journals (Sweden)

    Anatoliy Alexandrovich Malyuk

    2016-06-01

    Full Text Available During the formation of information society the problem of determining the demand for IS personnel (DfISP, consisting of IS specialists and IS practitioners, is of particular relevance at present. The goal of the paper is to calculate the demand for IS specialists (DfISS. To achieve it we used the informal heuristic methods and introduced some important indicators for DfISP forecast. As a validation of the conceptual approach proposed we show how to apply it on the regional level of one country on one real-world example. All the reasoning and calculations can be narrowed down to the DfISS forecasting within one corporation or IS professionals of a specific profile.

  17. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  18. Basic legal provisions concerning the activities of industrial security personnel

    International Nuclear Information System (INIS)

    Eberstein, H.H.

    1980-01-01

    The author confines himself to sabotage and espionage. Necessary counter-measures are determined by the respective type of activities. Sect. 618 of the German Civil Code and Sect. 120 a of the Industrial Code give basic legal provisions for the protection of industrial personnel. The legal position held by owner or occupant forms the legal basis for 'vulnerable point protection'. The owner's rights are assigned to the industrial police and are exercised in correspondence with the service or employment contract set up according to Sect. 611 and the following sections of the German Civil Code. Outside guards work according to the performance contract given int the Sections 675, 611, 631 of the German Civil Code. The security personnel has the common right of self-help: self-defence, civil rights concerning the state of national emergency and self-defence under criminal law, rights derived from ownership and property. The author critically argues views held by Mr. Hoffmann-Riem who thinks that police powers have been assigned to private persons. He definitely answers in the negative to the execution of, or encroachment on, sovereign (police) powers by industrial security personnel. A special legal regulation is not necessary, since private protection in form of professional selfdefence is admissible under the law in force. (HSCH) [de

  19. The Methodological Approach to Determining the Level of Formation and Provision of Enterprise Personnel Security

    Directory of Open Access Journals (Sweden)

    Gavkalova Nataliia L.

    2016-11-01

    Full Text Available The aim of the article is to substantiate the methodical approach to determining the level of formation and provision of enterprise personnel security. By analyzing, systematizing and generalizing scientific achievements of many scientists, approaches to the evaluation of personnel security at the enterprise were considered, a set of indices for evaluation of personnel security was defined. There justified the urgency of creating a comprehensive approach to evaluation of personnel security that includes implementation of the following stages: defining a list of indices corresponding to the level of formation and provision of personnel security with the help of the expert evaluation method; calculating integral indices of personnel security for each component and the corresponding level by means of the taxonomic analysis; grouping enterprises by the level of formation and provision of personnel security with the use of the cluster and discriminant analysis. It is found that the implementation of this approach will allow not only determining the level of formation and provision of personnel security at the enterprise, but also developing appropriate recommendations on improving its state. Prospects for further research in this direction are evaluation of conditions for formation and provision of personnel security at the enterprise, which will enable revealing negative destabilizing factors that influence personnel security

  20. 75 FR 8088 - Privacy Act of 1974; Department of Homeland Security/ALL-023 Personnel Security Management System...

    Science.gov (United States)

    2010-02-23

    ... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2009-0041] Privacy Act of 1974; Department of Homeland Security/ALL--023 Personnel Security Management System of Records AGENCY...

  1. Analysis of Specific Features of International Standards of Personnel Security of an Enterprise

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P.

    2014-03-01

    Full Text Available The article marks out components of personnel security of an enterprise, outlines processes of personnel management, which correspond with conditions of security of life and labour, competent, socially protected professional activity, availability of the acting system of motivation and stimulation, and possibilities for corporate conflicts resolution. The article presents basic standards, rules and legislative acts that regulate ensuring personnel security. It analyses specific features of application of standards with respect to: life security and labour protection culture at an enterprise, including managerial systems and practice, behaviour of personnel at working places and also intellectual component of personnel security, which envisages that personnel has knowledge and competences that assist in achievement of strategic goals of an enterprise.

  2. Improving method for calculating integral index of personnel security of company

    Directory of Open Access Journals (Sweden)

    Chjan Khao Yui

    2016-06-01

    Full Text Available The paper improves the method of calculating the integral index of personnel security of a company. The author has identified four components of personnel security (social and motivational safety, occupational safety, not confliction security, life safety which are characterized by certain indicators. Integral index of personnel security is designed for the enterprises of machine-building sector in Kharkov region, taking into account theweight coefficients j-th component of bj, and weighting factors that determine the degree of contribution of the ith parameter in the integral index aіj as defined by experts.

  3. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  4. 33 CFR 105.210 - Facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of the...

  5. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Science.gov (United States)

    2010-10-01

    ... information technology (IT) system, as required by the Department of Commerce Security Manual and Department of Commerce Security Program Policy and Minimum Implementation Standards. (b) Insert clause 1352.237... as National Security Contracts that will be performed on or within a Department of Commerce facility...

  6. 49 CFR 1522.121 - Security threat assessments for personnel of TSA-approved validation firms.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for personnel of TSA... FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation... for personnel of TSA-approved validation firms. Each of the following must successfully complete a...

  7. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    Science.gov (United States)

    2013-11-12

    to capture and transmit fingerprints . • Accurate Biometrics , a commercial Livescan fingerprinting provider, also received fingerprints electronically...FOUO). Monterey, CA: Defense Personnel Security Research Center. Herbig, K. L. (2008). Changes in espionage by American citizens , 1947-2007. (Tech...by American citizens , 1947-2001. (Tech. Rep. 02-05). Monterey, CA: Defense Personnel Security Research Center. Heuer, Jr., R. J., Crawford, K. S

  8. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  9. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  10. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  11. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  12. The laser Megajoule facility personnel security and safety interlocks

    International Nuclear Information System (INIS)

    Chapuis, J.C.; Arnoul, J.P.; Hurst, A.; Manson, M.

    2012-01-01

    The LMJ (Laser Megajoule) is designed to deliver about 1.4 MJ of 0.35 μm light to targets for high energy density physics experiments. Such an installation entails specific hazards related to the presence of intense laser beams, and high voltage power laser amplifiers. Furthermore, the thermonuclear fusion reactions induced by the experiment also produce different radiations and neutrons burst, and also activate various materials in the chamber environment. All these hazards could be lethal. The SSP (Personnel Safety System) was designed to prevent accidents and protect personnel working in the LMJ. To satisfy at the lowest cost the requirements of safety regulations and those of the operation management, the choice was made to implement a functional architecture built around two independent technological barriers when required by the risk level. Each technical barrier is composed of two subsets, one dedicated to hazard sources management, and the other one dedicated to worker presence management. The two completely independent barriers, even at the sensor or actuator level, are designed with different technologies adapted to the required Safety Integrity Level. The combination of these 2 barriers is equivalent to a unique barrier with a rate of dangerous failure of about 10 -6 per year

  13. Drug Use and Abuse: Background Information for Security Personnel

    Science.gov (United States)

    1994-05-01

    Neurotoxicity of methamphetamine : Mechanisms of action and issues related to aging. In Miller, M. A., & Kozel, N. J., (Eds.), op. cit. 99. Cox et al...lives. This presents a dilemma for clearance adjudicators. If clearance standards are too lax, security may not be protected . If standards are too...strict, many well-adjusted, adventuresome, and creative employees may be screened out. Drug use may weaken judgment and affect ability to protect

  14. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  15. Health consequences of shift-work: the case of iranian hospital security personnel.

    Science.gov (United States)

    Abedini, Roghayeh; Soltanzadeh, Ahmad; Faghih, Mohammad Amin; Mohammadi, Heidar; Kamalinia, Mojtaba; Mohraz, Majid Habibi; Arassi, Maziyar; Veyseh, Peyman Piran; Aghaei, Hamed; Hosseini, Seyed Younes

    2015-01-01

    Shift-work, which is an ergonomics issue in workplaces, can negatively affect workers. The security personnel of medical centers in Iran have multiple responsibilities and consequently are exposed to such unwanted situations as observing patients, disputing with patient's attendants, unwanted shift schedules, and being away from family for long periods. This study assessed health problems of Iranian hospital security personnel (shift-worker personnel) using the Survey of Shift-workers (SOS) questionnaire (Persian version). This cross-sectional study was conducted in seven medical centers (4 hospitals and 3 clinics). A total of 416 workers were surveyed: shift-workers (exposed group) (n=209) and non-shift-workers (unexposed group) (n=207). The prevalence of adverse health effects was higher in shift-workers than day-workers. The level of education and mean Body Mass Index (BMI) in shift-workers were significantly higher compared with day-workers. The prevalence of gastrointestinal disorders, cardiovascular and psychological problems were also significantly higher in shift-workers compared with day-workers. Overall, the prevalence of health problems among the security personnel of medical centers was high. Hence, it is recommended that personnel be put under periodic monitoring and receive medical counseling and treatment if there is any disorder.

  16. Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach.

    Science.gov (United States)

    Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem

    2013-01-01

    This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff.

  17. Results of nuclear security culture survey on personnel at nuclear power plants

    International Nuclear Information System (INIS)

    Yoo, Hosik; Lee, Jeong-Ho

    2015-01-01

    Highlights: • A new surveying questionnaire for evaluating the security awareness of personnel was developed. • The developed surveying tools consist of four categories and 44 questions in total. • The surveying tools developed in this study can be used in other countries. - Abstract: A survey to evaluate awareness of the nuclear security culture of personnel at nuclear facilities was developed. The survey was made up of a series of questionnaires that were divided into four categories, beliefs and attitude, operating systems, leadership behaviors and staff behaviors. Each category contained six to 16 questions. The category on beliefs and attitude was composed of questions that asked plant workers on how much consideration facility personnel give to issues of security when doing his/her work. The section pertaining to operating systems for nuclear security consisted of questions on guidance documents, information security, and education and training. The questions on leadership behaviors were separated into two parts, one for managers and another for staff. These include questions relating to communication between management and staff, surveillance work related to nuclear security and the sharing of information. The last category of questions concerned staff behaviors. It consisted of questions on knowledge, procedures and implementation related to nuclear security. A survey was conducted on 858 people who worked at nuclear power plants using the questionnaire that was developed in this study. The survey was performed between October 7 to 17, 2014. The survey results were collected and analyzed. A numerical value was given to each question, so that the results of the survey were represented as a score. The data revealed that awareness of the nuclear security culture increased with age. This increase stopped when staff members entered their 50s. It is believed that a person in his/her 50s has a greater degree of experience and passion for their work than

  18. 28 CFR 16.132 - Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records...

    Science.gov (United States)

    2010-07-01

    ... System—Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Department of Justice System-Personnel Investigation and Security Clearance Records for the Department of Justice (DOJ), DOJ-006. 16.132...

  19. Lack of skilled personnel as threat to HR security of industrial enterprises

    Directory of Open Access Journals (Sweden)

    Ozernikova Tatiana

    2017-01-01

    Full Text Available The article assesses the needs of Russian industrial enterprises for skilled labor. The authors consider deficiency in qualified personnel as a threat to the human resources security of industrial enterprises, and analyze its causes. The study includes the criteria to distinguish highly skilled employees in the labor force (education level, occupation, correspondence of performed work to education, and analysis of the dynamics of their number. It identifies the internal and external factors that have a significant influence on the number of qualified personnel. The external factors include the size of the salary, population growth due to migration, the regional level of the socio-economic development. The applied methods of analysis are single-factor analysis of variance (F-test, multiple regression and descriptive statistics. The analysis is based on the materials of the Russian Federal State Statistics Service, as well as on the Russian Longitudinal Monitoring Survey - Higher School of Economics.

  20. Machine vision applications for physical security, quality assurance and personnel dosimetry

    International Nuclear Information System (INIS)

    Kar, S.; Shrikhande, S.V.; Suresh Babu, R.M.

    2016-01-01

    Machine vision is the technology used to provide imaging-based solutions to variety of applications, relevant to nuclear facilities and other industries. It uses computerized image analysis for automatic inspection, process control, object sorting, parts assembly, human identity authentication, and so on. In this article we discuss the in-house developed machine vision systems at EISD, BARC for three specific areas: Biometric recognition for physical security, visual inspection for QA of fuel pellets, and fast neutron personnel dosimetry. The advantages in using these systems include objective decision making, reduced man-rem, operational consistency, and capability of statistical quantitative analysis. (author)

  1. Codetermination of the works council in matterss of a security screening of personnel

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If the licensing authority issues a licence to the operator of a nuclear installation subject to the obligation to have personnel to be employed or to be kept on screened for security purposes by the licensing authority, the works council of the nuclear installation is not in the position to demand refrainment from screening activities unless the works council has given consent. (BAGE 58, 297 = NZA 1988, 811 = AP Paragraph 87 BetrVG 1972 - Ordnung des Betriebes - Nr. 14). Decision of the Federal Labour Court of July 9, 1991 - 1 ABR 57/90 (lower instance: LAG Koeln, decision dated June 12, 1990 - 4 TaBV 2/90). (orig.) [de

  2. Employment of personnel of a security service company does not require the consent of the works council

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. Federal Labour Court, decision dated May 5, 1992 - 1 ABR 78/91. (orig./HP) [de

  3. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  4. Does the Department of Defense Possess Solutions for the Department of Homeland Security’s Personnel Management Issues?

    Science.gov (United States)

    2015-12-01

    culture, morale, and job satisfaction levels of employees .28 Gerstein argues the development of a Homeland Security personnel system and career maps...and culture, low morale, and job satisfaction levels of employees . DHS has been following a similar approach to the DOD in terms of professional...Homeland Security in its ability to accomplish its mission. Leadership weaknesses, insufficient education and training for employees , and retention

  5. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    Science.gov (United States)

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  6. Evaluation of scattered radiation emitted from X-ray security scanners on occupational dose to airport personnel

    International Nuclear Information System (INIS)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-01-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits. - Highlights: • Backscattered radiation emitted from the airport security scanners is estimated. • Inverse relation observed between backscattered radiation and scanners distance. • Occupational dose for personnel inspecting the scanners were up to 2.04 mSv/y. • The projected dose of security and engineering staff are well within dose limits.

  7. FAA computer security : concerns remain due to personnel and other continuing weaknesses

    Science.gov (United States)

    2000-08-01

    FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...

  8. Report: EPA’s Information Systems and Data Are at Risk Due to Insufficient Training of Personnel With Significant Information Security Responsibilities

    Science.gov (United States)

    Report #14-P-0142, March 21, 2014. The EPA places its information systems and data at risk due to an organizational structure that has not specified required duties and responsibilities to ensure personnel are trained on key information security roles.

  9. DOD PERSONNEL CLEARANCES: Additional OMB Actions Are Needed to Improve the Security Clearance Process

    National Research Council Canada - National Science Library

    2006-01-01

    Our independent analysis of timeliness data showed that industry personnel contracted to work for the federal government waited more than one year on average to receive top secret clearances, longer...

  10. PLC-based search and secure interlock system for the personnel safety in folded tandem ion accelerator

    International Nuclear Information System (INIS)

    Padmakumar, Sapna; Subramanyum, N.B.V.; Bhatt, Jignesh P.; Ware, Shailaja V.; Kansara, M.J.; Gupta, S.K.; Singh, P.

    2006-01-01

    Safety of the personnel is one of the key issues addressed in any accelerator project. The FOTIA facility at BARC is capable of operating under standard operation conditions without any radiation hazard. Even then for a safe and reliable operation of FOTIA a PLC (Programmable logic controller) based interlock system has been implemented. This interlocking system is compact, modular, flexible, robust and easy for troubleshooting. These advantages led to the popularity of PLC rather than using a relay-based system. This paper highlights the salient features of the search and secure interlock for the personal safety of FOTIA. (author)

  11. 10 CFR Appendix B to Part 73 - General Criteria for Security Personnel

    Science.gov (United States)

    2010-01-01

    .... Fixed site. B. Transportation. VI. Nuclear Power Reactor Training and Qualification Plan for Personnel.... Definitions Introduction Applicants and power reactor licensees subject to the requirements of § 73.55 shall... licensee to investigate into or judge the reading habits, political or religious beliefs, or attitudes on...

  12. 32 CFR Appendix E to Part 154 - Personnel Security Determination Authorities

    Science.gov (United States)

    2010-07-01

    ... designee 5. Chairman, Joint Chiefs of Staff and/or designee 6. Directors of the Defense Agencies and/or... personnel for assignment to Presidential Support activities: The Executive Secretary to the Secretary and... of Strategic Target Planning 2. Director, Joint Staff, OJCS 3. Chief of Staff, U.S. Army 4. Chief of...

  13. Reprint of 'Evaluation of Scattered Radiation Emitted From X-ray Security Scanners on Occupational Dose to Airport Personnel'

    Science.gov (United States)

    Dalah, Entesar; Fakhry, Angham; Mukhtar, Asma; Al Salti, Farah; Bader, May; Khouri, Sara; Al-Zahmi, Reem

    2017-11-01

    Based on security issues and regulations airports are provided with luggage cargo scanners. These scanners utilize ionizing radiation that in principle present health risks toward humans. The study aims to investigate the amount of backscatter produced by passenger luggage and cargo toward airport personnel who are located at different distances from the scanners. To approach our investigation a Thermo Electron Radeye-G probe was used to quantify the backscattered radiation measured in terms of dose-rate emitted from airport scanners, Measurements were taken at the entrance and exit positions of the X-ray tunnel at three different distances (0, 50, and 100 cm) for two different scanners; both scanners include shielding curtains that reduce scattered radiation. Correlation was demonstrated using the Pearson coefficient test. Measurements confirmed an inverse relationship between dose rate and distance. An estimated occupational accumulative dose of 0.88 mSv/y, and 2.04 mSv/y were obtained for personnel working in inspection of carry-on, and cargo, respectively. Findings confirm that the projected dose of security and engineering staff are being well within dose limits.

  14. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge...) Methods of physical screening of persons, personal effects, baggage, cargo, and vessel stores; and (m) The...

  15. 33 CFR 106.215 - Company or OCS facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as... security equipment and systems; (i) Inspection, control, and monitoring techniques; (j) Methods of physical...

  16. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  17. Contribution of Security Forces Personnel to Deter Migration and Improve Stability in West Africa

    Science.gov (United States)

    2017-06-09

    response, cybersecurity analyst, chemical facility inspector, and others.19 Limitations There are several limitations to this research. The time...basins and artificial lakes. This is one of the greatest achievements because agriculture represents one of the main economic activities of the...on intelligence to fill the gap in personnel. However, due to the level of poverty, human intelligence assets are the most preferred. Therefore, in

  18. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  19. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    Science.gov (United States)

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  20. 32 CFR 154.8 - Types and scope of personnel security investigations.

    Science.gov (United States)

    2010-07-01

    ..., benefits, and privileges under Federal programs. Accordingly, personal interviews are an integral part of... forth in the following paragraphs of this section. (1) BI/PR. A personal interview shall be conducted by... security clearability, or be otherwise stigmatizing. (3) Hostage situation. A personal interview shall be...

  1. Method to control the persons permitted to enter plants with increased security requirements and personnel lock for such plants

    International Nuclear Information System (INIS)

    Blaser, E.; Eickhoff, H.; Tretschoks, W.

    1978-01-01

    The personnel lock for a plant with increased security requirements, e.g. a nuclear power plant, has got two lock gates. Only persons whose right to enter has been established by the control equipment will be admitted to the lock chamber. For this purpose an identification recess is built in front of the first access to the lock chamber, where size, weight and the contours of the persons wanting to enter are roughly measured and compared with a code card carried along. The weight is established by a balance forming part of the base of the recess. By means of contact surfaces in the region of knees, upper thigh, chest and shoulder an upright position of the person is guaranteed. Scanning of the physical dimensions is performed with laser, infrared and light barriers. (DG) [de

  2. [A guide to good practice for information security in the handling of personal health data by health personnel in ambulatory care facilities].

    Science.gov (United States)

    Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel

    2014-04-01

    The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.

  3. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Brown, C.H.

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs

  4. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Brown, C.H. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs.

  5. Personnel Investigations and Clearance Tracking (OPI)

    Data.gov (United States)

    Office of Personnel Management — Security file-related information for the U.S. Office of Personnel Management (OPM)'s employee and contractor personnel. The data is OPM-specific, not government-wide.

  6. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E.

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs

  7. Physical fitness training reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Caplan, C.S.; Goold, R.E. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG are being provided to the Nuclear Regulatory Commission (NRC) as a reference manual which can be used by licensee management as they develop a program plan for the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The recommendations in this NUREG are similar in part to those contained within the Department of Energy (DOE) Medical and Fitness Implementation Guide which was published in March 1991. The guidelines contained in this NUREG are not requirements, and compliance is not required. 25 refs.

  8. Office of Personnel Management Catch 62 Match

    Data.gov (United States)

    Social Security Administration — SSA provides the Office of Personnel Management (OPM) with tax returns, Social Security benefits, and military retirement information for the purpose of correctly...

  9. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  10. Personnel monitoring

    International Nuclear Information System (INIS)

    1965-01-01

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  11. Personnel monitoring

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1966-12-31

    This film stresses the need for personnel monitoring in work areas where there is a hazard of exposure to radiation. It illustrates the use of personnel monitoring devices (specially the film dosimeter), the assessment of exposure to radiation and the detailed recording of the results on personnel filing cards

  12. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  13. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's manual for the training of SNM guards. Covered are: self-defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  14. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume contains the student guide. It contains the introduction to the course, terrorism, field search and restraints, criminal procedures, introduction to criminal law, offenses against persons and property, rules of conduct, use of force, firearms qualification course, self defense, arrest authority, civil liability, report writing, stress, and tactics

  15. Transportation security personnel training manual

    International Nuclear Information System (INIS)

    1978-11-01

    This volume is the instructor's guide, covering physical exercise, terrorism, field search and restraint, criminals procedures, introduction to criminal law, offenses against property, rules of conduct, use of force, firearms qualification, self defense, arrest authority, civil liability, report writing, stress, tactics, and situational training scenarios

  16. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  17. Personnel Preparation.

    Science.gov (United States)

    Fair, George, Ed.; Stodden, Robert, Ed.

    1981-01-01

    Three articles comprise a section on personnel preparation in vocational education. Articles deal with two inservice programs in career/vocational education for the handicapped and a project to train paraprofessionals to assist special educators in vocational education. (CL)

  18. Assessing Psycho-Social Resilience in Diplomatic, Civilian & Military Personnel Serving in a High-Threat Security Environment during Counter-Insurgency and Counter-Terrorism Operations in Iraq

    Directory of Open Access Journals (Sweden)

    Anne Speckhard

    2012-08-01

    Full Text Available Currently thousands of military, diplomatic and civilian personnel are deployed under NATO, UN, and other multi-national, as well as national auspices in high-threat security environments, including active conflict zones such as Iraq and Afghanistan.  Soldiers are generally well trained and prepared psychologically to face armed conflict. Civilian contractors and diplomats, on the other hand, often are not.  Moreover in today’s high-threat security environments terrorists, insurgents and even child soldiers may be the opposing force, creating a more uncertain and anxiety provoking environment and more difficult to identify security threat. These facts have serious implications for the psycho-social resilience of diplomatic, civilian and military personnel deployed in such environments.  This article investigates psycho-social resilience in a small exploratory sample of US embassy staff, contractors and US forces serving in Iraq during 2007, a time when Improvised Explosive Devices (IEDs, roadside bombings, mortar attacks, kidnappings, murders and sniper fire were an everyday occurrence in Iraq.

  19. Authorization gives the personnel he/she gives the center he/she gives Isotopes for the acting he/she gives tied functions with the security and the radiological protection

    International Nuclear Information System (INIS)

    Perez Pijuan, S.; Hernandez Alvarez, R.; Peres Reyes, Y.; Venegas Bernal, M.C.

    1998-01-01

    The conception is described used in a center production labelled compound and radiopharmaceuticals for the authorization to the support, operation and supervision personnel The approaches are exposed used to define the excellent positions for the security the installation. The are described the training programs, designed starting from the indentification the specific competitions for each duty station and with particular emphasis in the development gives abilities you practice. It is used for the administration and evaluation gives the programs training the Automated System Administration Programs Training (GESAT)

  20. Office of Personnel Management (OPM) Earnings

    Data.gov (United States)

    Social Security Administration — Each year the Office of Personnel Management (OPM) sends SSA a file to be verified and matched against the Master Earnings File (MEF) and Employer Information File...

  1. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  2. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  3. 49 CFR 1542.219 - Supplementing law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Supplementing law enforcement personnel. 1542.219 Section 1542.219 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.219 Supplementing law...

  4. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  5. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  6. Teamwork and the National Security Personnel System

    National Research Council Canada - National Science Library

    Willoughby, Michael B

    2007-01-01

    .... However, concern exists that only rewarding individual performance may adversely impact teamwork, collaboration, and information sharing, which could ultimately impact organizational performance...

  7. Neutron personnel dosimetry

    International Nuclear Information System (INIS)

    Griffith, R.V.

    1981-01-01

    The current state-of-the-art in neutron personnel dosimetry is reviewed. Topics covered include dosimetry needs and alternatives, current dosimetry approaches, personnel monitoring devices, calibration strategies, and future developments

  8. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  9. 49 CFR 193.2709 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  10. Personnel Monitoring Department - DEMIN

    International Nuclear Information System (INIS)

    1989-01-01

    The activities and purposes of the Personnel Monitoring Dept. of the Institute of Radioprotection and Dosimetry of the Brazilian CNEN are presented. A summary of the personnel monitoring service is given, such as dosemeters supply, laboratorial inspections, and so on. The programs of working, publishing, courses and personnel interchange are also presented. (J.A.M.M.)

  11. Personnel preferences in personnel planning and scheduling

    OpenAIRE

    van der Veen, Egbert

    2013-01-01

    Summary The personnel of an organization often has two conflicting goals. Individual employees like to have a good work-life balance, by having personal preferences taken into account, whereas there is also the common goal to work efficiently. By applying techniques and methods from Operations Research, a subfield of applied mathematics, we show that operational efficiency can be achieved while taking personnel preferences into account. In the design of optimization methods, we explicitly con...

  12. 32 CFR 154.61 - Security education.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Security education. 154.61 Section 154.61... PERSONNEL SECURITY PROGRAM REGULATION Continuing Security Responsibilities § 154.61 Security education. (a.... Through security briefings and education, the Department of Defense continues to provide for the...

  13. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  14. Evaluation of Agency's Public Personnel Administration

    OpenAIRE

    Neal W. Tamayo

    2017-01-01

    As a consultant for a government agency, this paper will design recommendations and improvements for the agency’s public personnel administration. In order to do this, the consultant has to become familiar with the agency, its departments and also understand the key factors. The department chosen from the government for this paper is the Social Security Administration (Kestenbaum, 2014).

  15. The Intensification of the Personnel Role.

    Science.gov (United States)

    Wangler, Lawrence A.

    1979-01-01

    Discusses personnel profession's increased responsibilities which are due to (1) consolidation of the Equal Employment Opportunity Commission, (2) labor law reform, (3) privacy legislation, (4) social security legislation, (5) open retirement, (6) medical plan costs, (7) codetermination, (8) labor scarcity, (9) top management compensation, and…

  16. 10 CFR 712.16 - DOE security review.

    Science.gov (United States)

    2010-01-01

    ... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file... 10 Energy 4 2010-01-01 2010-01-01 false DOE security review. 712.16 Section 712.16 Energy... Program Procedures § 712.16 DOE security review. (a) A personnel security specialist will perform a...

  17. Personnel preferences in personnel planning and scheduling

    NARCIS (Netherlands)

    van der Veen, Egbert

    2013-01-01

    Summary The personnel of an organization often has two conflicting goals. Individual employees like to have a good work-life balance, by having personal preferences taken into account, whereas there is also the common goal to work efficiently. By applying techniques and methods from Operations

  18. Personnel Policy and Profit

    DEFF Research Database (Denmark)

    Bingley, Paul; Westergård-Nielsen, Niels Chr.

    2004-01-01

    personnel structure variation. It is found that personnel policy is strongly related to economic performance. At the margin, more hires are associated with lower profit, and more separations with higher profit. For the average firm, one new job, all else equal, is associated with ?2680 (2000 prices) lower...

  19. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  20. Automating the personnel dosimeter monitoring program

    International Nuclear Information System (INIS)

    Compston, M.W.

    1982-12-01

    The personnel dosimetry monitoring program at the Portsmouth uranium enrichment facility has been improved by using thermoluminescent dosimetry to monitor for ionizing radiation exposure, and by automating most of the operations and all of the associated information handling. A thermoluminescent dosimeter (TLD) card, worn by personnel inside security badges, stores the energy of ionizing radiation. The dosimeters are changed-out periodically and are loaded 150 cards at a time into an automated reader-processor. The resulting data is recorded and filed into a useful form by computer programming developed for this purpose

  1. 78 FR 35042 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2013-06-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0407] Merchant Marine Personnel... Labor Organization's Maritime Labour Convention, 2006.'' This meeting will be open to the public. DATES... words ``Department of Homeland Security'' and the docket number for this action. Comments received will...

  2. Training of nonlicensed personnel

    International Nuclear Information System (INIS)

    Hetrick, D.E.

    1975-01-01

    The safety and efficiency with which a station operates is a function of the competence and proficiency of all personnel. This includes the nonlicensed personnel who make up the bulk of the station staff. Thus the training of these members of the station complement is an important function in overall station performance. Standards, regulations, regulatory guides, and codes provide guidance to the training requirements for such personnel. Training needs and objectives must be established, a plan prepared and then all incorporated into a training program. A well planned and operated training program will stimulate effective communications between the different groups within the station and between the station and off site support groups

  3. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    Science.gov (United States)

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  4. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  5. Civilian Personnel: Career Management

    National Research Council Canada - National Science Library

    2001-01-01

    This revision; (1) Contains changes required by the establishment of a consolidated and realigned management structure for civilian personnel, manpower, and related functions in the Office of the Assistant Secretary of the Army...

  6. Personnel neutron dosimetry

    International Nuclear Information System (INIS)

    Hankins, D.

    1982-04-01

    This edited transcript of a presentation on personnel neutron discusses the accuracy of present dosimetry practices, requirements, calibration, dosemeter types, quality factors, operational problems, and dosimetry for a criticality accident. 32 figs

  7. Personnel dose assignment practices

    International Nuclear Information System (INIS)

    Fix, J.J.

    1993-04-01

    Implementation of DOE N 5480.6 Radiological Control Manual Article 511(3) requirements, to minimize the assignment of personnel dosimeters, should be done only under a broader context ensuring that capabilities are in place to monitor and record personnel exposure both for compliance and for potential litigation. As noted in NCRP Report No. 114, personnel dosimetry programs are conducted to meet four major objectives: radiation safety program control and evaluation; regulatory compliance; epidemiological research; and litigation. A change to Article 511(3) is proposed that would require that minimizing the assignment of personnel dosimeters take place only following full evaluation of overall capabilities (e.g., access control, area dosimetry, etc.) to meet the NCRP objectives

  8. Personnel radiation dosimetry

    International Nuclear Information System (INIS)

    1987-01-01

    The book contains the 21 technical papers presented at the Technical Committee Meeting to Elaborate Procedures and Data for the Intercomparison of Personnel Dosimeters organizaed by the IAEA on 22-26 April 1985. A separate abstract was prepared for each of these papers. A list of areas in which additional research and development work is needed and recommendations for an IAEA-sponsored intercomparison program on personnel dosimetry is also included

  9. A personnel TLD system with person identification

    International Nuclear Information System (INIS)

    Widell, C.O.

    1974-01-01

    The TLD system uses Li 2 B 4 O 7 :Mn, Si sintered tablets which are heated by hot nitrogen. The slide which holds the tablets is coded by a self adhesive polyester-aluminium tape. This tape is BCD coded in an ordinary tape punch. The information on the punched tape includes a ten digit social-security number and a two digit information on location and type of dosimetry. By this system dosimetric data is directly transfered into a central dose register for Sweden. All personnel doses are there stored on social-security numbers. (author)

  10. Manpower, Personnel, and Training Assessment (MPTA) Handbook

    Science.gov (United States)

    2015-11-01

    programs. 8. Target Audience Description ( TAD ) The TAD is the initial description of the number and type of personnel required to operate, maintain...requirements, etc.) describing the Soldiers operating or maintaining the system. In cases where operating a system requires a security clearance, the TAD ...Authority. Milestone Decision Authority Target Audience Description ( TAD ) AR 602-2 AR 611-1 DA Pam 611-21 X X X X X X The TAD lists

  11. Training of maintenance personnel

    International Nuclear Information System (INIS)

    Rabouhams, J.

    1986-01-01

    This lecture precises the method and means developed by EDF to ensure the training of maintenance personnel according to their initial educational background and their experience. The following points are treated: General organization of the training for maintenance personnel in PWR and GCR nuclear power stations and in Creys Malville fast breeder reactor; Basic nuclear training and pedagogical aids developed for this purpose; Specific training and training provided by contractors; complementary training taking into account the operation experience and feedback; Improvement of velocity, competence and safety during shut-down operations by adapted training. (orig.)

  12. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (l) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper discusses the various types of security applications that are presently being considered for the above areas and briefly describes a few examples of the application of this technology

  13. Personnel photographic film dosimetry

    International Nuclear Information System (INIS)

    Keirim-Markus, I.B.

    1981-01-01

    Technology of personnel photographic film dosimetry (PPD) based on the photographic effect of ionizing radiation is described briefly. Kinds of roentgen films used in PPD method are enumerated, compositions of a developer and fixing agents for these films are given [ru

  14. Harmonious personnel scheduling

    NARCIS (Netherlands)

    Fijn van Draat, Laurens; Post, Gerhard F.; Veltman, Bart; Winkelhuijzen, Wessel

    2006-01-01

    The area of personnel scheduling is very broad. Here we focus on the ‘shift assignment problem’. Our aim is to discuss how ORTEC HARMONY handles this planning problem. In particular we go into the structure of the optimization engine in ORTEC HARMONY, which uses techniques from genetic algorithms,

  15. Nuclear Test Personnel Review

    Science.gov (United States)

    FOIA Electronic Reading Room Privacy Impact Assessment DTRA No Fear Act Reporting Nuclear Test Personnel Review NTPR Fact Sheets NTPR Radiation Dose Assessment Documents US Atmospheric Nuclear Test History Documents US Underground Nuclear Test History Reports NTPR Radiation Exposure Reports Enewetak

  16. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  17. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  18. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  19. Modernization of personnel training

    International Nuclear Information System (INIS)

    Haferburg, M.; Rehn, H.

    1997-01-01

    Personnel training in German nuclear power plants adheres to high standards complying with government regulations. The development of PC technology allows the introduction of new training methods, e.g. computer based training (CBT), as well as their integration into existing systems. In Germany, the operators of nuclear power plants have developed their own computer based standards with a screen design, a hardware platform and an assessment standard. 25% of the theoretical training of the shift personnel is covered by CBT. The CBT-Programmes offer multimedia features: videos, photographs, sound, graphs and switching diagrams of existing systems, practice oriented simulations and 3-D animations. Interaction is the most important attribute of an efficient self-learning-programme. A typical example of such an appropriate theme is the CBT-Lesson ''Pressure Surges in Pipes and Components of Power Plants''. (author)

  20. Do Military Personnel Patent

    Science.gov (United States)

    2016-12-01

    following questions: In what fields are military personnel most likely to patent, and how do demographics, such as age, race, and gender , along with...technologies, which have transformed how the United States wages war. DARPA continues to develop new technologies and capabilities for the U.S. military today...build the European navies so it instead decided to utilize an innovative ship design to exploit a gap specific to the British Royal Navy. The six

  1. Automatic personnel contamination monitor

    International Nuclear Information System (INIS)

    Lattin, Kenneth R.

    1978-01-01

    United Nuclear Industries, Inc. (UNI) has developed an automatic personnel contamination monitor (APCM), which uniquely combines the design features of both portal and hand and shoe monitors. In addition, this prototype system also has a number of new features, including: micro computer control and readout, nineteen large area gas flow detectors, real-time background compensation, self-checking for system failures, and card reader identification and control. UNI's experience in operating the Hanford N Reactor, located in Richland, Washington, has shown the necessity of automatically monitoring plant personnel for contamination after they have passed through the procedurally controlled radiation zones. This final check ensures that each radiation zone worker has been properly checked before leaving company controlled boundaries. Investigation of the commercially available portal and hand and shoe monitors indicated that they did not have the sensitivity or sophistication required for UNI's application, therefore, a development program was initiated, resulting in the subject monitor. Field testing shows good sensitivity to personnel contamination with the majority of alarms showing contaminants on clothing, face and head areas. In general, the APCM has sensitivity comparable to portal survey instrumentation. The inherit stand-in, walk-on feature of the APCM not only makes it easy to use, but makes it difficult to bypass. (author)

  2. Electronic Official Personnel Folder System

    Data.gov (United States)

    US Agency for International Development — The eOPF is a digital recreation of paper personnel folder that stores electronic personnel data spanning an individual's Federal career. eOPF allows employees to...

  3. Qualification of NPP operations personnel

    International Nuclear Information System (INIS)

    Wang Jiao.

    1987-01-01

    Competence of personnel is one of the important problems for safety operation of nuclear power plant. This paper gives a description of some aspects, such as the administration of NPP, posts, competence of personnel, training, assessing the competence and personnel management

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  6. Personnel ionizing radiation dosimeter

    International Nuclear Information System (INIS)

    Williams, R.A.

    1975-01-01

    A dosimeter and method for use by personnel working in an area of mixed ionizing radiation fields for measuring and/or determining the effective energy of x- and gamma radiation; beta, x-, and gamma radiation dose equivalent to the surface of the body; beta, x-, and gamma radiation dose equivalent at a depth in the body; the presence of slow neutron, fast neutron dose equivalent; and orientation of the person wearing the dosimeter to the source of radiation is disclosed. Optionally integrated into this device and method are improved means for determining neutron energy spectrum and absorbed dose from fission gamma and neutron radiation resulting from accidental criticality

  7. Personnel policy and management

    International Nuclear Information System (INIS)

    Dangelmaier, P.

    1986-01-01

    In the field of personnel policy and management two main points must be considered and fitted together: the aspects of the applicant and the aspects of the utility. The applicant wishes a position which suits to his abilities, education, training, experience and self-evaluation. The enterprise has beside these qualification criteria to look to some additional points: reliability - not only in the profession of the applicant but also in his daily life. In this examination licensing authorities are involved too; responsibility in a very broad sense and the ability to make correct decisions sometimes under stress situations. (orig.)

  8. Homeland Security. Management Challenges Facing Federal Leadership

    National Research Council Canada - National Science Library

    2002-01-01

    ...) and the Office of Personnel Management (OPM). Additionally, due to the dynamic and evolving nature of the government's homeland security activities, some of our work described in this report has already appeared in congressional testimony...

  9. 77 FR 11142 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-02-24

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0133] Merchant Marine Personnel... at the Hilton San Francisco Airport Bayfront Hotel, 600 Airport Blvd., Burlingame, CA 94010. For..., we are inviting public comment on the issues to be considered by the working group, which are listed...

  10. 77 FR 65570 - Merchant Marine Personnel Advisory Committee: Intercessional Meeting

    Science.gov (United States)

    2012-10-29

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0968] Merchant Marine Personnel... hotel facilities or services for individuals with disabilities or to request special assistance, contact... comment on the issues to be considered by the work group, which are listed in the ``Agenda'' section below...

  11. TRIAGE of Irradiated Personnel

    Science.gov (United States)

    1996-09-25

    DISTRIBUTION/AVAILABILITY STATEMENT APUBLIC RELEASE , 13. SUPPLEMENTARY NOTES 14. ABSTRACT See Report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF...4510). Under draft STANAG 4511, multiple pro- phylactic antiemetic medications and regimens were evaluated prior to adoption of granisetron . Two drugs...exceeded the criteria (shown below), granisetron and ondansetron. The former was adopted due to a better technical profile and the operational

  12. A performance evaluation of personnel identity verifiers

    International Nuclear Information System (INIS)

    Maxwell, R.L.; Wright, L.J.

    1987-01-01

    Personnel identity verification devices, which are based on the examination and assessment of a body feature or a unique repeatable personal action, are steadily improving. These biometric devices are becoming more practical with respect to accuracy, speed, user compatibility, reliability and cost, but more development is necessary to satisfy the varied and sometimes ill-defined future requirements of the security industry. In an attempt to maintain an awareness of the availability and the capabilities of identity verifiers for the DOE security community, Sandia Laboratories continues to comparatively evaluate the capabilities and improvements of developing devices. An evaluation of several recently available verifiers is discussed in this paper. Operating environments and procedures more typical of physical access control use can reveal performance substantially different from the basic laboratory tests

  13. Human factors in layers of defense in airport security

    NARCIS (Netherlands)

    Andriessen, H.; Van Gulijk, C.; Ale, B.J.M.

    2012-01-01

    Airport security systems are built up out of layers of defence based on the security-in-depth model (Talbot & Jakeman, 2008). The Transport Safety Authority (TSA) in the United States defined a staggering 20 layers of defence to control security risks. This means that not only security personnel is

  14. Training of personnel

    International Nuclear Information System (INIS)

    1997-01-01

    Selected staffs (in the area of NPPs) are examined by the State Examining Committee established by Nuclear Regulatory Authority of the Slovak Republic (NRA SR's) chairman. The committee consists of representatives of NRA SR , Bohunice NPPs, Mochovce NPP, Research Institute of Nuclear Energy and experts from the Faculty of Electrical Engineering and Information Technology of the Slovak Technical University. The review of selected personnel of NPP V-1, V-2 and Mochovce NPP which passed exams in 1996 is given. NRA SR paid attention to the upgrading training process of individual categories of staff for V-1, V-2 and Mochovce NPPs, simulator training and training with computerized simulation system according to the United criteria of nuclear installation personnel training that started in 1992. During the year, an inspection was performed focused on examination of technical equipment of the simulator of Mochovce NPP, professional eligibility and overall preparation of simulator training including simulator software. Throughout the year launching works continued at the simulator with the deadline of commissioning to trial use operation in the first half of 1997

  15. Quo vadis, personnel monitoring

    International Nuclear Information System (INIS)

    Becker, K.

    1975-01-01

    With the increasing use of nuclear power and radiation sources, the selection of optimum systems for personnel monitoring is becoming a matter of worldwide concern. The present status of personnel dosimetry, sometimes characterized by unstable and inaccurate detectors and oversimplified interpretation of the results, leaves much to be desired. In particular, photographic film, although having certain advantages with regard to economics and information content, undergoes rapid changes in warm and humid climates. Careful sealing reduces, but does not prevent, these problems. The replacement of film by solid-state dosimeters, primarily thermoluminescence dosimeters, is in progress or being considered by an increasing number of institutions and requires a number of decisions concerning the choice of the optimum detector(s), badge design, and evaluation system; organizational matters, such as the desirability of automation and computerized bookkeeping; etc. The change also implies the potential use of such advanced concepts as different detectors and monitoring periods for the large number of low-risk persons and the small number of high-risk radiation workers. (auth)

  16. Personnel training and certification

    International Nuclear Information System (INIS)

    Whittemore, W.L.

    1976-01-01

    In order to make the full benefits of neutron radiography available in the nondestructive test (NDT) field, it has been necessary to formalize its application. A group under the Penetrating Radiation Committee of the American Society for Nondestructive Testing (ASNT) was organized to prepare a recommended practice for neutron radiography. The recommended practices require the establishment of an appropriate certification program. The requirements on the employer to establish and maintain a qualification and certification program are outlined. To conduct a program of nondestructive testing using neutron radiography requires the usual three levels of qualified and certified personnel. The program is administered by a Level III person. Routine exposure, reviews, and reporting of test results are the responsibilities of Level I and Level II personnal. The amount of training and nature of the required practical examination are also specified. The recommended practices document assures users that NDT work in the field of neutron radiography is performed by qualified personnel. Although no training courses are available to provide experience in the depth required by the recommended practices document, SNT-TC-1A, short courses are provided at a number of locations to familarize user's representatives with the interpretation of neutron radiographs and capabilities and limitations of the technique

  17. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  18. 2014 Year End Report: Center for Development of Security Excellence

    Science.gov (United States)

    2014-01-01

    Personnel Security Adjudications In August 2014, LT Tetyana Muirhead, a U.S. Navy Nurse , earned her Certificates in Security Leadership and in...website or on the CDSE YouTube channel. Personnel can watch the webinars and download associated job aids and resources. CDSE OPEN ELEARNING COURSES

  19. The remote security station (RSS)

    International Nuclear Information System (INIS)

    Pletta, J.B.

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform

  20. Privacy Act System of Records: EPA Personnel Emergency Contact Files, EPA-44

    Science.gov (United States)

    Learn about the EPA Personnel Emergency Contact Files System, including including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedure.

  1. Personnel Selection Method Based on Personnel-Job Matching

    OpenAIRE

    Li Wang; Xilin Hou; Lili Zhang

    2013-01-01

    The existing personnel selection decisions in practice are based on the evaluation of job seeker's human capital, and it may be difficult to make personnel-job matching and make each party satisfy. Therefore, this paper puts forward a new personnel selection method by consideration of bilateral matching. Starting from the employment thoughts of ¡°satisfy¡±, the satisfaction evaluation indicator system of each party are constructed. The multi-objective optimization model is given according to ...

  2. Dental Health Status and Treatment Needs of Police Personnel of a ...

    African Journals Online (AJOL)

    Background: Oral health is an integral part of general health. Police personnel form the backbone for safety and security of a community hence their health is of utmost importance. Aim: The present study was conducted to assess the oral health status and treatment needs of police personnel employed in police stations of ...

  3. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    physical protection system is not covered by such studies, since this type of detection gives no information on either the effectiveness or the reliability of the MC and A systems. A critical scenario is defined as one which leads to discrepancies involving substantial amounts of NM or for which the detection delay is long. Special care is taken when analysing these scenarios. For critical scenarios, sensitivity analysis could be made to determine the smallest quantity of NM the disappearance of which could be detected or the criteria leading to the detection of the disappearance in the control system or in the accounting system. The threats taken into account are identified with reference to the design basis threat specified by the competent authority. Both internal and external threats are taken in account. Internal threats are defined as attempts by insiders to steal quantities of nuclear material, either once or on several occasions; accumulating these quantities leads to a significant quantity of NM. External threats are defined as attempts by groups of aggressors to steal significant amounts of nuclear material. Two hypotheses are taken into account to test the ability of the physical protection system to counter threats of this type. The first is based on a small group of aggressors with limited resources and the second involves a larger team with more sophisticated resources. Of course security studies have to be carried out in compliance with the corresponding confidentiality rules. In addition, such studies have to be regularly updated, notably if significant modifications are made in the MC and A or PP systems. It is important that security studies are available in the facilities for competent personnel, as it gives the rationale behind control and protection of NM. In particular, it could be used, in a performance-based approach, to support analysis reports or to illustrate that the required level of security has been reached. (author)

  4. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  5. Personnel Officers: Judging Their Qualifications.

    Science.gov (United States)

    Webb, Gisela

    1988-01-01

    Discusses the backgrounds and qualifications appropriate for a library personnel administrator, including (1) a master's degree in library science; (2) library work experience; (3) additional training in administration, personnel management, organizational development, and psychology; and (4) personal attributes such as good communication skills,…

  6. Personnel Practices for Small Colleges.

    Science.gov (United States)

    Bouchard, Ronald A.

    Personnel administration in higher education is the focus of this "hands-on, how-to-do-it" guide that provides fundamental materials for developing and maintaining a sound personnel program. Part One (Employment) examines government regulations, employee recruitment and selection, pre-employment inquiries and screening, post-employment process,…

  7. Neutron personnel dosimetry

    International Nuclear Information System (INIS)

    Griffith, R.V.

    1982-01-01

    The measurement of neutron exposures to personnel is an issue that has received increased attention in the last few years. It is important to consider key aspects of the whole dosimetry system when developing dose estimates. This begins with selection of proper dosimeters and survey instruments, and extends through the calibration methods. One must match the spectral response and sensitivity of the dosimeter to the spectral characteristics of the neutron fields. Threshold detectors that are insensitive to large fractions of neutrons in the lower energy portion of reactor spectra should be avoided. Use of two or more detectors with responses that complement each other will improve measurement quality. It is important to understand the spectral response of survey instruments, so that spectra which result in significant overresponse do not lead to overestimation of dose. Calibration sources that do not match operational field spectra can contribute to highly erroneous results. In those situations, in-field calibration techniques should be employed. Although some detection developments have been made in recent years, a lot can be done with existing technology until fully satisfactory, long term solutions are obtained

  8. Personnel dosimetry in fluoroscopy

    International Nuclear Information System (INIS)

    Baechler, S.; Gardon, M.; Bochud, F.; Sans-Merce, M.; Verdun, F.R.; Trueb, Ph.

    2006-01-01

    Physicians who frequently perform fluoroscopic examinations are exposed to high intensity radiation fields and should use protective equipment such as lead aprons, thyroid shields and lead glasses. Standard individual dosimeters are worn under the lead apron in order to measure a dose that is representative of effective dose. However, large parts of the body are not protected by the apron (e.g. arms, head). Given a protection factor for the apron of about 100, an important irradiation of a body part not under the apron could go undetected. A study was conducted to analyse this situation by measuring dose using two dosimeters, one over-apron and one under-apron, for radiologists performing frequent fluoroscopic examinations. Measurements made over six-month period show that, indeed, the use of a single under-apron dosimeter is inadequate for personnel monitoring. Large doses to the head and arms are going undetected by this technique. A method for weighting the doses measured by under- and over-apron dosimeters to obtain a value better representative of the effective dose will be proposed. (authors)

  9. Special training of shift personnel

    International Nuclear Information System (INIS)

    Martin, H.D.

    1981-01-01

    The first step of on-the-job training is practical observation phase in an operating Nuclear Plant, where the participants are assigned to shift work. The simulator training for operating personnel, for key personnel and, to some extent, also for maintenance personnel and specialists give the practical feeling for Nuclear Power Plant behaviour during normal and abnormal conditions. During the commissioning phase of the own Nuclear Power Plant, which is the most important practical training, the participants are integrated into the commissioning staff and assisted during their process of practical learning by special instructors. The preparation for the licensing exams is vitally important for shift personnel and special courses are provided after the first non-nuclear trial operation of the plant. Personnel training also includes performance of programmes and material for retraining, training of instructors and assistance in building up special training programmes and material as well as training centers. (orig./RW)

  10. Dosimetry of the Occupational Exposure Personnel and not exposure of the INNSZ

    International Nuclear Information System (INIS)

    Ruiz J, A.

    1999-01-01

    In this work, was measured the equivalent dose of all the personnel of Nuclear medicine and personnel of the Institute which by its activities remain in the Department, by time determined, through thermoluminescent dosemeters and the results were that the personnel presents variable equivalent dose and it is proportional to the time and radionuclide type which use for their work. By this it is allowed to secure what the work watched with respect to radiological protection to fulfil with the International Standards standing for personnel in the Institute. (Author)

  11. Cold Vacuum Dryer (CVD) Facility Security System Design Description. System 54

    International Nuclear Information System (INIS)

    WHITEHURST, R.

    2000-01-01

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas

  12. Personnel Risks in Ensuring Safety of Medical Activity

    Directory of Open Access Journals (Sweden)

    O. L. Zadvornaya

    2017-01-01

    Full Text Available Purpose: modern strategies of management of the organization require the formation of special management approaches based on the analysis of the mechanisms and processes of the organization of medical activities related to possible risks in activity of medical personnel. Based on international experience and own research the authors have identified features of a system of management of personnel risk in medical activities, examined approaches showing the sequence and contents of the main practical activities of the formation, maintenance and development of the system of management of personnel risks. Emphasized is the need for further research and implementation of the system of management of personnel risk in health care organizations. Study and assessment of personnel risks affecting the security of medical activities aimed at the development of the system of personnel risk management, development of a system of identification and monitoring of HR risk indicators with a purpose to improve institutional management and increase efficiency of activity of medical organizations. Methods: in the present study, the following methods were used: systemic approach, content analysis, methods of social diagnosis (questionnaires, interviews, comparative analysis, method of expert evaluations, method of statistical processing of information. Results: approaches to predict the occurrence and development of personnel risks have been reviewed and proposed. Conclusions and Relevance: patient safety is a global issue affecting countries at all levels of development. Each year, the WHO identifies a number of systemic and technical aspects and trends in the field of patient safety related to actions of medical workers. Existing imbalances in the staffing of the health system of the Russian Federation increase the probability of potential risks in medical practice. The personnel policy of healthcare of the Russian Federation requires further improvement and

  13. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  14. Cyberculture and Personnel Security: Report 1 - Orientation, Concerns, and Needs

    Science.gov (United States)

    2011-05-01

    criteria for Internet addiction. Cyber Psychology and Behavior, 4, 377-383. Bender, B. (2010). Pentagon workers tied to child porn . Retrieved July 30...C. (2007). Virtual child porn riles law enforcement. Retrieved July 29, 2010, from http://abcnews.go.com/TheLaw/story?id=3159871 Frontline. (2009...blackmail girl for porn . PC World. Retrieved February 4, 2011, from http://www.pcworld.com/article/218582/Man_Used_Facebook_to_Try_to_Bl

  15. Ensuring Successful Personnel Management in the Department of Homeland Security

    Science.gov (United States)

    2002-01-01

    of Public- Private Sector Wages Allowing for Endogenous Choices of Both Government and Union Status,” Journal of Labor Economics , Vol. 6, 1988...Differential in the United States,” Journal of Labor Economics , Vol. 8, No. 2, 1990. Rosenthal, Douglas, Margaret Barton, Douglas Reynolds, and Beverly Dugan

  16. Personnel Security during Joint Operations with Foreign Military Forces

    Science.gov (United States)

    2013-08-01

    century society into the twenty-first century encounters a number of obstacles. Illiteracy and innumeracy rates are high, and repressive social values are...force of more than 4,500 British soldiers dispatched by the governor of India . Shortly thereafter, British imperialism prompted two more Anglo-Afghan...socialist change on a traditional society, in part by redistributing land and bringing more women into government. The at- tempt at rapid modernization

  17. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... section of the economy; productivity; competition; jobs; the environment; public health or safety; or..., religion, sex, national origin, disability, or sexual orientation, and no inference may be raised solely on the basis of an individual's sexual orientation. (f) Discretionary judgments that determine...

  18. Some problems of NPP personnel training

    International Nuclear Information System (INIS)

    Vajshnis, P.P.; Kumkov, L.P.; Omel'chuk, V.V.

    1984-01-01

    Shortcomings of NPP personnel training are discussed. Development of full-scale training systems is necessary for qualitative training operative personnel. Primary problems that should be necessarily solved for ensuring effective training NPP personnel are considered

  19. Energy Requirements of Military Personnel

    National Research Council Canada - National Science Library

    Tharion, William J; Lieberman, Harris R; Montain, Scott J; Young, Andrew J; Baker-Fulco, Carol J

    2005-01-01

    ...) have been measured while training under various conditions. Group mean total energy expenditures for 424 male military personnel from various units engaged in diverse missions ranged from 13.0 to 29.8 MJ per day...

  20. Individual protection of NPP personnel

    International Nuclear Information System (INIS)

    Koshcheev, V.S.; Gol'dshtejn, D.S.; Chetverikova, Z.S.

    1983-01-01

    Specific features of NPP personnel individual protection are considered, mainly with respect to maintenance and repair works on various type reactors. The major concern is given to the selection and application reglamentations of the individual protection system (IPS), employment of sanitary locks, the organization of individual protection under the conditions of a heating microclimate. The ways are specified to the development and introduction of the most effective IPS and improvement of the entire NPP personnel individual protection system with respect to providing the necessary protection effect for maintaining high working capability of the personnel and minimizing the IPS impact on human organism functional systems. The accumulated experience in the personnel individual protection can be applied during construction and operation of NPP's in CMEA member-countries [ru

  1. Personnel monitoring in geologic fields

    International Nuclear Information System (INIS)

    Romanova, I.N.; Seredin, Yu.V.

    1981-01-01

    State of radiation safety for the personnel of geologic crews carrying out neutron logging of wells using Po-Be sources has been evaluated. Given are results of development of methods for the evaluation of individual radiation loads for personnel when working with Po-Be neutron sources useful for the application in practice by a geologic logging crew as well as a quantitative evaluation of profissional radiation loads during this kind of work. The following methods are recommended for personnel monitoring: 1) calculation of whole-body irradiation doses and hands from averaged values of radiation dose rate; 2) calculational tabulated determination of irradiation doses during recharging of shanks of well instruments. Personnel monitoring by means of instrumental methods is not necessary in the considered case [ru

  2. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  3. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  4. Personnel external dose monitoring system

    International Nuclear Information System (INIS)

    Zhao Hengyuan

    1989-01-01

    The status and trend of personnel external dose monitoring system are introduced briefly. Their characteristics, functions and TLD bedges of some commercially available automatic TLD system, including UD-710A (Matsushita, Japan), Harshaw-2271, 2276 (Harshaw, USA), Harshaw-8000 (Harshaw/Filtrol), Studsvik-1313 (Sweden) and Pitman-800 (UK) were depicted in detail. Finally, personnel dose management and record keeping system were presented and two examples were given

  5. THEORETICAL BASIS FOR MANAGEMENT OF PERSONNEL RISKS

    OpenAIRE

    Haliashova, Katsiaryna

    2017-01-01

    Necessity of personnel risks management is based on research results. The authors' approaches to the determination of personnel risks and to their management have been explored. The author's definition of the concept of "personnel risks" is proposed. A classification of personnel risks is developed depending on the stage of origin and the tasks of the personnel policy, as well as the methods of management personnel risks in the organization. The article presents a methodical approach to perso...

  6. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  7. 4 CFR 83.9 - Social Security number.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Social Security number. 83.9 Section 83.9 Accounts GOVERNMENT ACCOUNTABILITY OFFICE RECORDS PRIVACY PROCEDURES FOR PERSONNEL RECORDS § 83.9 Social Security number. (a) GAO may not require individuals to disclose their Social Security Number (SSN) unless...

  8. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  9. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  10. The WINS Academy Security Certification Programme: The Route to Demonstrable Competence

    International Nuclear Information System (INIS)

    Howsley, Roger

    2014-01-01

    Key Messages: The Nuclear Sector is a long way behind other sectors in certifying personnel with security accountabilities as being competent; We need to do something about it urgently; Attending security awareness courses is simply not enough

  11. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  12. Military personnel recognition system using texture, colour, and SURF features

    Science.gov (United States)

    Irhebhude, Martins E.; Edirisinghe, Eran A.

    2014-06-01

    This paper presents an automatic, machine vision based, military personnel identification and classification system. Classification is done using a Support Vector Machine (SVM) on sets of Army, Air Force and Navy camouflage uniform personnel datasets. In the proposed system, the arm of service of personnel is recognised by the camouflage of a persons uniform, type of cap and the type of badge/logo. The detailed analysis done include; camouflage cap and plain cap differentiation using gray level co-occurrence matrix (GLCM) texture feature; classification on Army, Air Force and Navy camouflaged uniforms using GLCM texture and colour histogram bin features; plain cap badge classification into Army, Air Force and Navy using Speed Up Robust Feature (SURF). The proposed method recognised camouflage personnel arm of service on sets of data retrieved from google images and selected military websites. Correlation-based Feature Selection (CFS) was used to improve recognition and reduce dimensionality, thereby speeding the classification process. With this method success rates recorded during the analysis include 93.8% for camouflage appearance category, 100%, 90% and 100% rates of plain cap and camouflage cap categories for Army, Air Force and Navy categories, respectively. Accurate recognition was recorded using SURF for the plain cap badge category. Substantial analysis has been carried out and results prove that the proposed method can correctly classify military personnel into various arms of service. We show that the proposed method can be integrated into a face recognition system, which will recognise personnel in addition to determining the arm of service which the personnel belong. Such a system can be used to enhance the security of a military base or facility.

  13. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  14. Cytogenic Investigations in Flight Personnel

    International Nuclear Information System (INIS)

    Wolf, G.; Obe, G.; Bergau, L.

    1999-01-01

    During long-distance flights at high altitudes flight personnel are exposed to cosmic radiation. In order to determine whether there are biological effects of such low dose radiation exposure in aircrew, chromosomal aberrations were investigated in 59 female cabin attendants and a matched control group of 31 members of station personnel. The mean number of dicentric chromosomes amounts to 1.3 (95% CI 1.0-1.6) per 1,000 cells in cabin attendants and 1.4 (95% CI 1.0-1.9) per 1,000 cells in controls. In an additional control group of 56 female clerks from Berlin the mean frequency of dicentric chromosomes was 1.3 (95% CI 1.0-1.6). Neither in dicentric frequency and distribution nor in other aberrations was a significant difference between the groups of flight and station personnel found. The high frequency of multi-aberrant cells was remarkable in flight personnel as well as in station personnel. The reason for this phenomenon is unknown and needs further investigation. (author)

  15. Training of research reactor personnel

    International Nuclear Information System (INIS)

    Cherruau, F.

    1980-01-01

    Research reactor personnel operate the reactor and carry out the experiments. These two types of work entail different activities, and therefore different skills and competence, the number of relevant staff being basically a function of the size, complexity and versatility of the reactor. Training problems are often reactor-specific, but the present paper considers them from three different viewpoints: the training or retraining of new staff or of personnel already employed at an existing facility, and training of personnel responsible for the start-up and operation of a new reactor, according to whether local infrastructure and experience already exist or whether they have to be built up from scratch. On-the-spot experience seems to be an essential basis for sound training, but requires teaching abilities and aids often difficult to bring together, and the availability of instructors that does not always fit in smoothly with current operational and experimental tasks. (author)

  16. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  17. Personnel Management theories and applications

    Institute of Scientific and Technical Information of China (English)

    Yanni Feng

    2010-01-01

    @@ 1.Introduction Many new businesses are opened in the whole world every day.Unfortunately,only a minor part of them has success and continues its activity.There is a variety of reasons which determine the hankruptcy of companies.Most of them are included in running a business,and more and more people come to realize the significance of management,especially personnel management,as personnel represents the relationship between people in the company,which is a key point for the development of enterprise.

  18. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  19. Ethnic Minority Personnel Careers: Hindrances and Hopes

    OpenAIRE

    Ross, Catharine

    2004-01-01

    Personnel departments often have particular responsibility for equal opportunities within their organizations. This paper explores equal opportunities within personnel departments themselves, in relation to the careers of ethnic minority personnel practitioners. Through primary research, it identifies a range of criteria which can affect personnel careers, of which ethnic origin is often one. However, although being categorized as of ethnic minority origin often hinders personnel careers, the...

  20. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  1. US statutes of general interest to safeguards and security officers

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1988-09-01

    This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)

  2. development of an integrated campus security alerting system

    African Journals Online (AJOL)

    user

    Keywords: Campus Security, Microcontroller, Internet Protocol Camera, Integrated system, Micro-switches. 1. INTRODUCTION .... personnel can fall back to the information captured/stored ...... Adetoba A. O. "Design and Construction of a Car.

  3. Zero based programming: a viable security budgeting approach.

    Science.gov (United States)

    Roll, Frederick G

    2003-01-01

    To get additional dollars or avoid budget cuts or personnel reductions, healthcare security directors should consider a budget approach that best justifies the needs of the department or organization.

  4. 32 CFR 552.109 - Routine security controls.

    Science.gov (United States)

    2010-07-01

    ..., dependent, or DoD civilian identification cards are authorized unimpeded access to Fort Lewis during periods... who desire to visit unit areas, club facilities and other recreational facilities, security personnel...

  5. ILO Policy Guidelines on the promotion of decent work for early childhood education personnel

    OpenAIRE

    ILO International Labour Office

    2014-01-01

    These Guidelines set out principles for the promotion of decent work for early childhood education (ECE) personnel as a means of ensuring universal access to high-quality ECE services. In this respect they cover conditions of work and employment of ECE personnel and related issues, including ECE financing, curricula and learning practices, social security, professional ethics and ECE governance systems. The Guidelines are meant to serve as a reference tool on principles that should be reflect...

  6. Security of Radioactive Waste

    International Nuclear Information System (INIS)

    Goldammer, W.

    2003-01-01

    Measures to achieve radioactive waste security are discussed. Categorization of waste in order to implement adequate and consistent security measures based on potential consequences is made. The measures include appropriate treatment/storage/disposal of waste to minimize the potential and consequences of malicious acts; management of waste only within an authorised, regulated, legal framework; management of the security of personnel and information; measures to minimize the acquisition of radioactive waste by those with malicious intent. The specific measures are: deter unauthorized access to the waste; detect any such attempt or any loss or theft of waste; delay unauthorized access; provide timely response to counter any attempt to gain unauthorised access; measures to minimize acts of sabotage; efforts to recover any lost or stolen waste; mitigation and emergency plans in case of release of radioactivity. An approach to develop guidance, starting with the categorisation of sources and identification of dangerous sources, is presented. Dosimetric criteria for internal and external irradiation are set. Different exposure scenarios are considered. Waste categories and security categories based on the IAEA INFCIRC/225/Rev.4 are presented

  7. Security in the nuclear medicine department

    International Nuclear Information System (INIS)

    Bassingham, S.; Gane, J.; Chan, P.S.; Heenan, S.; Gulliver, N.; McVey, J.

    2005-01-01

    The current threat from terrorism highlights the need for awareness of adequate security of radioactive sources by health bodies to prevent the opportunistic access to, theft of. or accidental loss of sources, together with stringent security measures in place to prevent the international misuse of radioactive sources as a weapon by unauthorised access. This presentation discusses the processes undertaken to ensure the safety and security of radioactive materials within the nuclear medicine department in line with current regulations and guidelines. These include risk assessments, security systems, audit trails, restricted access and personnel background checks

  8. Study of personnel monitoring programs

    International Nuclear Information System (INIS)

    Guerra, Aline B.; Lorenzini, Fabiane; Carlos, Janaina; Bernasiuk, Maria E.B.; Rizzatti, Mara R.; Fuentefria, Jose L.B.

    1996-01-01

    Surveillance of several health institutions who use ionizing radiation sources, as well as data from the state of Rio Grande do Sul (Brazil) are studied concerning the use of personnel dosimeters. The results show that several institutions do not provide them and those which provide do not know how to use them

  9. Rights & Responsibilities. Personnel Management Module.

    Science.gov (United States)

    Barker, Gale; And Others

    This module on rights and responsibilities is intended to introduce the hospitality manager or supervisor to sound personnel management practices that comply with the law. The material is presented in a self-instructional format in seven sections. At the beginning of each section is a statement of the objectives that will be achieved as a result…

  10. Personnel monitoring for beta rays

    International Nuclear Information System (INIS)

    Piesch, E.; Johns, T.F.

    1983-01-01

    The practical considerations which have to be taken into account in the design of personnel monitors intended to measure doses resulting from exposure to beta rays are discussed. These include the measurement of doses in situations involving either fairly uniform or non-uniform irradiation and of doses to the male gonads. (UK)

  11. Project Management Personnel Competencies Evaluation

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2006-01-01

    Full Text Available An important factor for the success management of IT projects is the human resource. People involved in the project management process have to be evaluated. In order to do that, same criteria has to be specified. This paper describes some aspects regarding the personnel evaluation.

  12. 78 FR 37244 - Submission for Review: We Need Important Information About Your Eligibility for Social Security...

    Science.gov (United States)

    2013-06-20

    ... Important Information About Your Eligibility for Social Security Disability Benefits, RI 98-7. As required... Personnel Management. Title: We Need Important Information About Your Eligibility for Social Security... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need Important Information About Your...

  13. Safeguards through secure automated fabrication

    International Nuclear Information System (INIS)

    DeMerschman, A.W.; Carlson, R.L.

    1982-01-01

    Westinghouse Hanford Company, a prime contractor for the U.S. Department of Energy, is constructing the Secure Automated Fabrication (SAF) line for fabrication of mixed oxide breeder fuel pins. Fuel processing by automation, which provides a separation of personnel from fuel handling, will provide a means whereby advanced safeguards concepts will be introduced. Remote operations and the inter-tie between the process computer and the safeguards computer are discussed

  14. Study on Maintenance Personnel Development Plan For The Exported APR1400 Commissioning

    International Nuclear Information System (INIS)

    Cho, Sungbae; Kim, Jongdae; Jun, Hokwang; Hwang, Inok; Kang, Jaeyuel

    2012-01-01

    This paper indicates ways to develop maintenance personnel for the exported APR1400 commissioning. The exported APR1400 has not been experienced ay maintenance yet, and requirements for maintenance personnel have not been clarified yet. Based on sound maintenance experience, KEPCO Plant Service and Engineering Company (KEPCO KPS) has studied on maintenance training and career requirement to establish a development plan of the maintenance personnel for the exported nuclear power plant. By defining manpower and training requirement, and mobilization plan, we expect to secure reliability of the exported APR1400

  15. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  16. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  17. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  18. Essential themes in Personnel economics

    OpenAIRE

    Josheski, Dushko

    2014-01-01

    In this paper are presented essential themes in the subject of personnel economics. In the first part analysis has been conducted on the impact of peer pressure on workplace behaviour. Then again models for compensation structures within firms, and their influence on the utility of work by employees. In the final section of the paper the productivity spillover effect has been analyzed, and the causes of existence of spillovers and their impact on workers’ productivity

  19. Modern methods of personnel dosimetry

    International Nuclear Information System (INIS)

    Kraus, W.; Herrmann, D.; Kiesewetter, W.

    The physical properties of radiation detectors for personnel dosimetry are described and compared. The suitability of different types of dosimeters for operational and central monitoring of normal occupational exposure, for accident and catastrophe dosimetry and for background and space-flight dosimetry is discussed. The difficulties in interpreting the dosimeter reading with respect to the dose in individual body organs are discussed briefly. 430 literature citations (up to Spring 1966) are given

  20. The LHC personnel safety system

    International Nuclear Information System (INIS)

    Ninin, P.; Valentini, F.; Ladzinski, T.

    2011-01-01

    Large particle physics installations such as the CERN Large Hadron Collider require specific Personnel Safety Systems (PSS) to protect the personnel against the radiological and industrial hazards. In order to fulfill the French regulation in matter of nuclear installations, the principles of IEC 61508 and IEC 61513 standard are used as a methodology framework to evaluate the criticality of the installation, to design and to implement the PSS.The LHC PSS deals with the implementation of all physical barriers, access controls and interlock devices around the 27 km of underground tunnel, service zones and experimental caverns of the LHC. The system shall guarantee the absence of personnel in the LHC controlled areas during the machine operations and, on the other hand, ensure the automatic accelerator shutdown in case of any safety condition violation, such as an intrusion during beam circulation. The LHC PSS has been conceived as two separate and independent systems: the LHC Access Control System (LACS) and the LHC Access Safety System (LASS). The LACS, using off the shelf technologies, realizes all physical barriers and regulates all accesses to the underground areas by identifying users and checking their authorizations.The LASS has been designed according to the principles of the IEC 61508 and 61513 standards, starting from a risk analysis conducted on the LHC facility equipped with a standard access control system. It consists in a set of safety functions realized by a dedicated fail-safe and redundant hardware guaranteed to be of SIL3 class. The integration of various technologies combining electronics, sensors, video and operational procedures adopted to establish an efficient personnel safety system for the CERN LHC accelerator is presented in this paper. (authors)

  1. Career path for operations personnel

    International Nuclear Information System (INIS)

    Asher, J.A.

    1985-01-01

    This paper explains how selected personnel can now obtain a Bachelor of Science degree in Physics with a Nuclear Power Operations option. The program went into effect the Fall of 1984. Another program was worked out in 1982 whereby students attending the Nuclear Operators Training Program could obtain an Associates of Science degree in Mechanical Engineering Technology at the end of two years of study. This paper presents tables and charts which describe these programs and outline the career path for operators

  2. Moral distress in nursing personnel

    OpenAIRE

    Barlem,Edison Luiz Devos; Lunardi,Valéria Lerch; Lunardi,Guilherme Lerch; Tomaschewski-Barlem,Jamila Geri; Silveira,Rosemary Silva da; Dalmolin,Graziele de Lima

    2013-01-01

    OBJECTIVE: to analyze the frequency and intensity of moral distress experienced by nursing personnel in southern Brazil, covering elements of their professional practice. METHOD: a survey was undertaken in two hospitals in Rio Grande do Sul, Brazil, with 247 nurses. Data was collected by means of the adapted Moral Distress Scale. RESULTS: the perception of situations that lead to moral distress is enhanced in nurses and in nursing staff working in institutions with greater openness to dialogu...

  3. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-06-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (1) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper will discuss the various types of security applications that are presently being considered for the above areas and will briefly describe a few examples of the application of this technology. Examples will include ground mobile platforms carrying alarm assessment and/or surveillance sensors and operating either autonomously or with telepresence by a remote operator. An airborne platform performing similar functions will also be discussed. An application of a type of robot sentry that would be fixed and incorporate very simple portable displays will also be described. A third type of robot, an interior robot, that could be used in sensitive or hazardous areas to do detection and assessment functions will be reviewed

  4. 75 FR 32833 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Office of Personnel Management...

    Science.gov (United States)

    2010-06-09

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0077] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Office of Personnel Management (OPM))--Match 1307 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...

  5. Personnel exposures in industrial radiography

    International Nuclear Information System (INIS)

    Shenoy, K.S.; Patel, P.H.

    1979-01-01

    The manifold increase in production, and ease of availability of radioisotopes in India have been responsible for a tremendous increase in use of radioisotopes in industrial radiography during past fifteen years. Among various applications of radioisotopes the industrial radiography involves a large potential risk of occupational radiation exposures. The dose records of past fifteen years in respect of all radiation workers maintained by the Personnel Monitoring Group of Division of Radiological Protection of the Bhabha Atomic Research Centre, Bombay, have been analysed. Analysis of excessive exposure (exceeding 400 mrem/fortnight) reveals that this figure is increasing at an alarming rate among the radiation workers of this category. In spite of various regulatory controls the dose per person per week has remained higher as compared to the same in other categories. This combined with the increase in number of radiation workers every year would soon contribute significantly to the per capita dose for radiation workers. Use of adequately shielded fool-proof remote control equipment and training of all personnel in safe handling of radiation sources seem to be the only solution to arrest the rate of increase in personnel exposures of this category. (auth.)

  6. National Finance Center Personnel/Payroll System

    Data.gov (United States)

    US Agency for International Development — The NFC system is an USDA system used for processing transactions for payroll/personnel systems. Personnel processing is done through EPIC/HCUP, which is web-based....

  7. Supporting the personnel reliability decision-making process with artificial intelligence

    International Nuclear Information System (INIS)

    Harte, D.C.

    1991-01-01

    Recent legislation concerning personnel security has vastly increased the responsibility and accountability of the security manager. Access authorization, fitness for duty, and personnel security access programs require decisions regarding an individual's trustworthiness and reliability based on the findings of a background investigation. While these guidelines provide significant data and are useful as a tool, limited resources are available to the adjudicator of derogatory information on what is and is not acceptable in terms of granting access to sensitive areas of nuclear plants. The reason why one individual is deemed unacceptable and the next acceptable may be questioned and cause discriminatory accusations. This paper is continuation of discussion on workforce reliability, focusing on the use of artificial intelligence to support the decisions of a security manager. With this support, the benefit of previous decisions helps ensure consistent adjudication of background investigations

  8. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  9. Optimisation of the Process of Managing Personnel Security of a Company Оптимизация процесса управления кадровой безопасностью предприятий

    Directory of Open Access Journals (Sweden)

    Mіshin Aleksandr Yu.

    2013-02-01

    Full Text Available The article analyses existing approaches to managing personnel security of business units at a micro level; it considers notional and categorical mechanism, environment of formation of the system of managing personnel security of a company; specifies scientific and theoretical approach to optimisation of the process of managing personnel security of a company by means of identification of stages, subsystems of management, interdependencies and interconnections between them, which, unlike existing approaches, ensures rational combination of system and situation oriented management.Проанализированы существующие подходы к управлению кадровой безопасностью бизнес-единиц на микроуровне; рассмотрен понятийно-категориальный аппарат, среда формирования системы управления кадровой безопасностью предприятия; уточнён научно-теоретический подход к оптимизации процесса управления кадровой безопасностью предприятий за счет определения этапов, подсистем управления, взаимозависимостей и взаимосвязей между ними, что, в отлич��и от существующих подходов, обеспечивает рациональное сочетание системно и ситуационно ориентированного управления.

  10. Understanding the security management practices of humanitarian organizations.

    Science.gov (United States)

    Bollettino, Vincenzo

    2008-06-01

    Humanitarian organisations operate in increasingly hostile environments. Although authoritative statistics are scarce, anecdotal evidence suggests that aid workers face life-threatening risks that are exacerbated by the growing number of humanitarian organisations operating in the field, the diversity of their mandates, the lack of common professional security standards, and limited success in inter-agency security coordination. Despite broad acceptance of the need for better security management and coordination, many humanitarian organisations remain ambivalent about devoting increased resources to security management and security coordination. A critical lack of basic empirical knowledge of the field security environment hampers efforts to enhance security management practices. The absence of a systematic means of sharing incident data undermines the capacity of the humanitarian community to address proactively security threats. In discussions about humanitarian staff safety and security, the least common denominator remains cumulative anecdotal evidence provided by the many security personnel working for humanitarian organisations in the feld.

  11. 76 FR 66933 - Privacy Act of 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG-014 Military Pay...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security U.S. Coast Guard DHS/USCG--014 Military Pay and Personnel System... Security U.S. Coast Guard--014 Military Pay and Personnel System of Records.'' This system of records allows the Department of Homeland Security U.S. Coast Guard to collect and maintain records regarding pay...

  12. 76 FR 18812 - Submission for Review: We Need the Social Security Number of the Person Named Below, RI 38-45

    Science.gov (United States)

    2011-04-05

    ... OFFICE OF PERSONNEL MANAGEMENT Submission for Review: We Need the Social Security Number of the... request (ICR) 3206-0144, We Need the Social Security Number of the Person Named Below, RI 38-45. As... Operations, Retirement Services, Office of Personnel Management. Title: We Need the Social Security Number of...

  13. 10 CFR 36.55 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 36.55 Section 36.55 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR IRRADIATORS Operation of Irradiators § 36.55 Personnel monitoring. (a) Irradiator operators shall wear a personnel dosimeter that is...

  14. 49 CFR 193.2711 - Personnel health.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Personnel health. 193.2711 Section 193.2711 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2711 Personnel health. Each operator...

  15. Personnel Development Practices in Turkish Education System

    Science.gov (United States)

    Ozdemir, Tuncay Yavuz

    2016-01-01

    Nowadays everything develops and changes very quickly and sustainability of organizational goals will be possible only when personnel can keep up with these changes. From administrative aspect it is important to enhance personnel's potential and prompt them to achieve organizational goals. Personnel development is a process which influences and…

  16. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  17. Current personnel dosimetry practices at DOE facilities

    International Nuclear Information System (INIS)

    Fix, J.J.

    1981-05-01

    Only three parameters were included in the personnel occupational exposure records by all facilities. These are employee name, social security number, and whole body dose. Approximate percentages of some other parameters included in the record systems are sex (50%), birthdate (90%), occupation (26%), previous employer radiation exposure (74%), etc. Statistical analysis of the data for such parameters as sex versus dose distribution, age versus dose distribution, cumulative lifetime dose, etc. was apparently seldom done. Less than 50% of the facilities reported having formal documentation for either the dosimeter, records system, or reader. Slightly greater than 50% of facilities reported having routine procedures in place. These are considered maximum percentages because some respondents considered computer codes as formal documentation. The repository receives data from DOE facilities regarding the (a) distribution of annual whole body doses, (b) significant internal depositions, and (c) individual doses upon termination. It is expected that numerous differences exist in the dose data submitted by the different facilities. Areas of significant differences would likely include the determination of non-measurable doses, the methods used to determine previous employer radiation dose, the methods of determining cumulative radiation dose, and assessment of internal doses. Undoubtedly, the accuracy of the different dosimetry systems, especially at low doses, is very important to the credibility of data summaries (e.g., man-rem) provided by the repository

  18. Certification of Canadian nuclear power plant personnel

    International Nuclear Information System (INIS)

    Newbury, F.

    2014-01-01

    The Canadian Nuclear Safety Commission (CNSC) regulates the use of nuclear energy and materials to protect health, safety, security of Canadians and the environment, and to implement Canada's international commitments on the peaceful use of nuclear energy. As part of its mandate, the CNSC requires certification of those who work in positions with direct impact on the safety of Canadian nuclear power plants (NPPs) and research reactors. Other positions, such as exposure device operators and radiation safety officers at other nuclear facilities, also require CNSC certification. In this paper, the certification process of Canadian NPP personnel will be examined. In keeping with the CNSC's regulatory philosophy and international practice, licensees bear the primary responsibility for the safe operation of their NPPs. They are therefore held entirely responsible for training and testing their workers, in accordance with applicable regulatory requirements, to ensure they are fully qualified to perform their duties. The CNSC obtains assurance that all persons it certifies are qualified to carry out their respective duties. It achieves this by overseeing a regime of licensee training programs and certification examinations, which are based on a combination of appropriate regulatory guidance and compliance activities. Reviews of the knowledge-based certification examination methodology and of lessons learned from Fukushima have generated initiatives to further strengthen the CNSC's certification programs for NPP workers. Two of those initiatives are discussed in this paper. (author)

  19. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  20. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  1. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  2. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  3. A guide for developing an ADP security plan for Navy Finance Center, Cleveland, Ohio

    OpenAIRE

    Barber, Daniel E.; Hodnett, Elwood Thomas, Jr.

    1982-01-01

    Approved for public release; distribution is unlimited This paper is intended to be used as a guide by personnel at the Navy Finance Center (NFC) Cleveland, Ohio in developing an Automatic Data Processing (ADP) Security Plan. An effort has been made to combine the requirements for an ADP security plan established by OPNAVINST5239.1A with pertinent information from other selected readings. The importance of the devotion of personnel, time and funds to ADP security planning has been emphas...

  4. Development of an integrated campus security alerting system ...

    African Journals Online (AJOL)

    This work presents an integrated alerting system which uses both the Internet Protocol (IP) cameras and micro-switches for monitoring security situations thereby providing an immediate alerting signal to the security personnel. The system has the input unit, processing unit, control unit and the power supply unit as its ...

  5. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  6. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  7. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  8. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  9. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  10. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  11. Special feature article-very urgent nuclear energy personnel training

    International Nuclear Information System (INIS)

    Saito, Shinzo; Tsujikura, Yonezo; Kawahara, Akira

    2007-01-01

    Securing human resources is important for the sustainable development of research, development and utilization of nuclear energy. However, concerns have been raised over the maintenance of human resources due to the decline of public and private investment in research and development of nuclear energy in recent years. To that end, it is essential for the workplace in the field of nuclear energy to be engaging. This special feature article introduced the Government's fund program supporting universities and vocational colleges to develop human resources in the area of nuclear energy. Electric utilities, nuclear industries, nuclear safety regulators and related academia presented respective present status and issues of nuclear energy personnel training with some expectations to the program to secure human resources with professional qualifications. (T. Tanaka)

  12. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  13. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  14. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  15. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  16. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  17. 76 FR 63811 - Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and...

    Science.gov (United States)

    2011-10-13

    ... implementation of policies and minimum standards regarding information security, personnel security, and systems security; address both internal and external security threats and vulnerabilities; and provide policies and... policies and minimum standards will address all agencies that operate or access classified computer...

  18. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  19. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  20. An Investigation of Social Factors Affecting on Personnel Job Satisfaction of Remedial Service Insurance Department

    Directory of Open Access Journals (Sweden)

    Sayyed Yaser Ebrahimian Jolodar

    2012-01-01

    Full Text Available Because of the paramount importance of job satisfaction and due to its main consequences such as reduction of work absence and resignation, personnel promotion and society‟s health, and more importantly, its role in achievement of organization goals, this study aimed at investigating the effects of six social factors including personnel‟s belief, salary and benefits, participation in organizational decision-making, sense of job security, interaction with colleagues and meeting the basic needs of personnel on job satisfaction. The statistical population of this study was the personnel of Remedial Service Insurance Department in Sari and the questionnaire was distributed among them. The results showed that there is a significant and positive correlation among all these factors and they have meaningful effects on personnel job satisfaction based on multiple regression analysis. Furthermore, findings revealed that personnel‟s belief about their job has the most effects on job satisfaction.

  1. Towards a new approach to the labour law applicable to contractors’ personnel

    CERN Multimedia

    Corinne Pralavorio

    2010-01-01

    On 18 October, CERN and its two Host States will sign agreements on the labour law applicable to the personnel of contractors operating on the CERN site. Once they have entered into force, the agreements will facilitate execution of service contracts for both firms and CERN, and will provide the personnel concerned with better security and more stability.   On 18 October 2010, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. A site that straddles the French-Swiss border makes CERN unique among international organizations. Although this unique characteristic is a fine symbol of international collaboration, it also entails some legal and administrative difficulties. On 18 October, CERN and its Host States have signed a tripartite agreement on the labour law applying to service contractors’ personnel. This agreement will be supplemented by a bilateral agreement between France and Switzerland amending the 1...

  2. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  3. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  4. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  5. Burnout among Danish prison personnel

    DEFF Research Database (Denmark)

    Andersen, Dorte Raaby; Andersen, Lars Peter; Gadegaard, Charlotte Ann

    2017-01-01

    Objectives The objective of this follow-up study was to investigate associations between individual, occupational and work environment factors and burnout among both uniformed and non-uniformed personnel working in the Danish Prison and Probation Service. Methods The participants (N = 4808......) with client contact received a questionnaire in 2010 and again in 2011. In 2010, 2843 participants responded to the questionnaire (59.1%), and in 2011, 1741 responded to the questionnaire, yielding a response rate of 61.2% of the baseline population, and 36.2% of the invited population. Burnout and work...... characteristics were measured with validated scales from the Copenhagen Psychosocial Questionnaire, and data was analysed by logistic regression. Results Risk factors with the highest impact on burnout were work environmental factors: quantitative demands, emotional demands, involvement in and meaning of work...

  6. The Daresbury personnel safety system

    International Nuclear Information System (INIS)

    Poole, D.E.; Ring, T.

    1989-01-01

    The personnel safety system designed for the SRS at Daresbury is a unified system covering the three accelerators of the source itself, the beamlines and the experimental stations. The system has also been applied to the experimental areas of the Nuclear Structure Facility, and is therefore established as a site standard. A dual guardline interlock module forms a building block for a relay based interlock system completely independent of the machine control system, although comprehensive monitoring of the system status via the control system computer is a feature. An outline of the design criteria adopted for the system is presented together with a more detailed description of the philosophy of the guardline logic and the way this is implemented in a standard modular form. The emphasis is on the design features of a modern microprocessor based variant of the original SRS system. Experience with the original system during build-up and operation of the SRS facility is described. 2 refs., 4 figs

  7. Director general presentation to personnel

    CERN Multimedia

    2016-01-01

    Dear Colleagues, Many important discussions are scheduled for the upcoming Council Week (13-17 June) on topics including the Medium-Term Plan, the Pension Fund and other matters of great relevance to us.   I would therefore like to share the main outcome of the week with you and I invite you to join me and the Directors in the Main Auditorium at 10 a.m. on Thursday 23 June. The meeting will last about one hour and a webcast will also be available. Best regards, Fabiola Gianotti DG presentation to personnel Thursday 23 June at 10 am Main Auditorium Retransmission in Council Chamber, IT Auditorium, Kjell Jonhsen Auditorium, Prevessin 864-1-C02 Webcast on cern.ch/webcast More information on the event page.

  8. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  9. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  10. 76 FR 39887 - Extension of Agency Information Collection Activity Under OMB Review: Highway Corporate Security...

    Science.gov (United States)

    2011-07-07

    ... Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of Management... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... the site visit, TSA personnel complete the CSR form, which asks security-related questions. This...

  11. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  12. Technical guidelines for personnel dosimetry calibrations

    International Nuclear Information System (INIS)

    Roberson, P.L.; Fox, R.A.; Hadley, R.T.; Holbrook, K.L.; Hooker, C.D.; McDonald, J.C.

    1983-01-01

    A base of technical information has been acquire and used to evaluate the calibration, design, and performance of selected personnel systems in use at Department of Energy (DOE) facilites. A technical document was prepared to guide DOE and DOE contractors in selecting and evaluating personnel dosimetry systems and calibration. A parallel effort was initiated to intercompare the adiological calibrations standards used to calibrate DOE personnel dosimeters

  13. Department of Defense Civilian Personnel Manual

    National Research Council Canada - National Science Library

    1996-01-01

    .... It implements policy, establishes uniform DoD-wide procedures, provides guidelines and model programs, delegates authority, and assigns responsibilities regarding civilian personnel management within...

  14. Musculoskeletal disorders in main battle tank personnel

    DEFF Research Database (Denmark)

    Nissen, Lars Ravnborg; Guldager, Bernadette; Gyntelberg, Finn

    2009-01-01

    PURPOSE: To compare the prevalence of musculoskeletal disorders of personnel in the main battle tank (MBT) units in the Danish army with those of personnel in other types of army units, and to investigate associations between job function in the tank, military rank, and musculoskeletal problems......, and ankle. RESULTS AND CONCLUSIONS: There were only 4 women in the MBT group; as a consequence, female personnel were excluded from the study. The participation rate was 58.0% (n = 184) in the MBT group and 56.3% (n = 333) in the reference group. The pattern of musculoskeletal disorders among personnel...

  15. Khmelnitsky NPP personnel training system improvement

    International Nuclear Information System (INIS)

    Sapronov, V.G.; Issupov, V.I.

    1996-01-01

    Khmelnitsky nuclear power plant personnel training system improvement is described, including creation of Training center, development of training courses based on SAT methodology, development of training hardware

  16. Sources of personnel for multinuclear companies

    International Nuclear Information System (INIS)

    Guppy, W.H.

    1975-01-01

    Included are comments and statistics on current employment levels, projected requirements for future stations, sources of personnel for current and projected stations, and methods of employee selection

  17. Educating personnel for nuclear technology in Czechoslovakia

    International Nuclear Information System (INIS)

    Otcenasek, P.

    1980-01-01

    The basic preconditions are discussed of educating personnel for nuclear power and nuclear technology in Czechoslovakia. In educating specialists, the high societal significance of nuclear power and the need to obtain qualified personnel for safeguarding safety and reliability of nuclear facilities operation should primarily be borne in mind. The system of training applies not only to operating and maintenance personnel of nuclear power plants but also to fuel and power generation, transport, engineering, building industry, health care, education and other personnel. (J.B.)

  18. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  19. A passive automated personnel accountability system for reactor emergency preparedness

    International Nuclear Information System (INIS)

    Zimmerman, R.O.; DeLisle, G.V.; Hickey, E.E.

    1988-04-01

    In 1985 a project was undertaken at the N Reactor on the Hanford Site to develop an automated personnel accountability system to ensure accountability of all personnel within 30 minutes of a site evacuation. The decision to develop such a system was made after a full-scale evacuation drill showed that the manual accountability system in use at the time was inadequate to meet the 30-minute requirement. Accountability systems at commercial nuclear power plants were evaluated, but found to be unsuitable because they were not passive, that is, they required action on part of the user for the system to work. Approximately 2500 people could be required to evacuate the 100-N Area. Therefore, a card key system or badge exchange system was judged not to be feasible. A passive accountability system was desired for N Reactor to allow personnel to enter and leave the site in a more timely manner. To meet the need for an automated accountability system at N Reactor, a special Evacuation Accountability System (EVACS) was designed and developed. The EVACS system has three basic components: the transponder, a credit card-sized device worn with the security badge; portal monitors, which are electronically activated by the transponder; and a computer information system that contains the personnel data base. Each person wearing a transponder is accounted for automatically by walking through a portal. In this paper, a description of the hardware and software will be presented, together with problems encountered and lessons learned while adapting an existing technology to this particular use. The system is currently installed and requires acceptance testing before becoming operational

  20. Causes and prevention of violence toward emergency personnel by patients and their relatives in a province in Turkey.

    Science.gov (United States)

    Cebeci, Fatma; Sucu, Gülten; Karazeybek, Ebru

    2009-03-23

    STUDY OBJECTIVE: This research was conducted to determine the opinions of the emergency department's personnel about the causes and prevention of violence directed at them by patients and their relatives. METHODS: This research was conducted between 3 February and 15 June, 2006, in Antalya, a province in southern Turkey, with a total of 216 emergency department personnel who work in the emergency departments of three hospitals. A questionnaire developed by researchers was used to collect data for the purpose of determining what kind of violence is directed at emergency personnel by patients and their relatives and the personnel's socio-demographic characteristics and opinions. Pearson's chi and Fisher's exact test were used in the analysis of the data. RESULTS: Almost all (94.4%) of the participating emergency personnel had been exposed to verbal violence and 59.7% to physical violence. Only 24.5% of those exposed to violence reported the violence. The majority of the personnel (72.5%) thought that individuals' personality tendencies are the primary cause of violence. Their primary recommendation for preventing violence was to increase security measures. Statistically significant differences were found between emergency personnel's place of work and physical violence, between gender and physical violence, and between level of education and reporting violence. CONCLUSION: On the basis of the research results, it is recommended that emergency personnel be trained on the subject of violence, a documentation system be developed for recording and reporting violence, and corrections be made to prevent violence based on the personnel's opinions.

  1. Theoretical foundations of information security investment security companies

    Directory of Open Access Journals (Sweden)

    G.V. Berlyak

    2015-03-01

    Full Text Available Methodological problems related to the lack of guidance in the provisions (standards of accounting on the reflection in the accounting and financial reporting of the research object. In this connection, it is proposed to amend the provisions (standards of accounting. This will allow to come to the consistency of accounting methods of operations with elements of investment activity. Based on analysis of the information needs of users suggested indicators identikativnye blocks (block corporate finance unit assess the relationship with financial institutions, block the fulfillment of obligations according to the calculations, the investment unit, a science and innovation, investment security and developed forms of internal accounting controls and improvements to existing forms financial statements for the investment activities of the enterprise. Using enterprise data reporting forms provide timely and reliable information on the identity and structure of investment security and enable the company to effectively plan and develop personnel policies for enterprise management.

  2. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  3. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  4. A novel wireless local positioning system for airport (indoor) security

    Science.gov (United States)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  5. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  6. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  7. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  8. Return to work: Police personnel and PTSD

    NARCIS (Netherlands)

    Plat, Marie-Christine J.; Westerveld, Gre J.; Hutter, Renée C.; Olff, Miranda; Frings-Dresen, Monique H. W.; Sluiter, Judith K.

    2013-01-01

    This study i) describes the number of police personnel with PTSD who are working and those who are on sick leave before and after an out-patient-clinic treatment program and ii) examines which factors are related to return to work. Police personnel treated for PTSD (n=121). In this retrospective

  9. 10 CFR 26.155 - Laboratory personnel.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Laboratory personnel. 26.155 Section 26.155 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Laboratories Certified by the Department of Health and Human... ensure the continued competency of laboratory personnel by documenting their in-service training...

  10. Personnel radiation safety in nuclear power plants

    International Nuclear Information System (INIS)

    Elkert, J.

    1979-05-01

    The principal contributions to the radiation doses of the Swedish power reactor personnel are identified. The possi bilities to reduce these doses are examined. The radiation doses are analyzed according to different personnel categories, specific maintenance operations or inspections and to different radiation activities. Suggestions are given for reducing the radiation doses. (L.E.)

  11. Maintenance Personnel Performance Simulation (MAPPS) model

    International Nuclear Information System (INIS)

    Siegel, A.I.; Bartter, W.D.; Wolf, J.J.; Knee, H.E.; Haas, P.M.

    1984-01-01

    A stochastic computer model for simulating the actions and behavior of nuclear power plant maintenance personnel is described. The model considers personnel, environmental, and motivational variables to yield predictions of maintenance performance quality and time to perform. The mode has been fully developed and sensitivity tested. Additional evaluation of the model is now taking place

  12. 10 CFR 39.65 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 39.65 Section 39.65 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Radiation Safety Requirements § 39.65 Personnel monitoring. (a) The licensee may not permit an individual to act as a logging...

  13. 10 CFR 34.47 - Personnel monitoring.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Personnel monitoring. 34.47 Section 34.47 Energy NUCLEAR REGULATORY COMMISSION LICENSES FOR INDUSTRIAL RADIOGRAPHY AND RADIATION SAFETY REQUIREMENTS FOR INDUSTRIAL RADIOGRAPHIC OPERATIONS Radiation Safety Requirements § 34.47 Personnel monitoring. (a) The licensee may not...

  14. 21 CFR 211.28 - Personnel responsibilities.

    Science.gov (United States)

    2010-04-01

    ... apparel, such as head, face, hand, and arm coverings, shall be worn as necessary to protect drug products... observation) to have an apparent illness or open lesions that may adversely affect the safety or quality of... medical personnel not to jeopardize the safety or quality of drug products. All personnel shall be...

  15. Health-physics personnel: a need unfulfilled

    International Nuclear Information System (INIS)

    Kathren, R.E.

    1983-06-01

    Current trends and conditions in the health physics profession are discussed. The need for health physics personnel in academia, nuclear power plants, other nuclear industry, national laboratories, and other sectors and the shortfall in qualified personnel to fill the available positions is described. Reasons for the present situation and recommendations for alleviating it are presented

  16. Innovative activity of personnel of organization

    Directory of Open Access Journals (Sweden)

    V. N.Belkin

    2010-09-01

    Full Text Available This article deals with transition way of economic of the Russian Federation on an innovative way of development. The special attention is given the internal social and economic environment of the organizations which, as a rule, counteracts development of innovative activity of the personnel. Ways of increase of innovative activity of the personnel are offered.

  17. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  18. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  19. Dosimetry of the Occupational Exposure Personnel and not exposure of the INNSZ; Dosimetria del Personal Ocupacionalmente Expuesto (POE) y no expuesto del INNSZ

    Energy Technology Data Exchange (ETDEWEB)

    Ruiz J, A [Departamento de Medicina Nuclear, Instituto nacional de la nutricion Salvador Zubiran, Mexico D.F. C.P. 14100 (Mexico)

    1999-07-01

    In this work, was measured the equivalent dose of all the personnel of Nuclear medicine and personnel of the Institute which by its activities remain in the Department, by time determined, through thermoluminescent dosemeters and the results were that the personnel presents variable equivalent dose and it is proportional to the time and radionuclide type which use for their work. By this it is allowed to secure what the work watched with respect to radiological protection to fulfil with the International Standards standing for personnel in the Institute. (Author)

  20. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  1. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  2. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  3. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  4. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  5. 34 CFR 361.18 - Comprehensive system of personnel development.

    Science.gov (United States)

    2010-07-01

    ... implementation of a plan to address the current and projected needs for personnel who are qualified in accordance... accordance with paragraph (c) of this section, including personnel from minority backgrounds and personnel... retraining, recruiting, and hiring personnel; (B) The specific time period by which all State unit personnel...

  6. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    National Research Council Canada - National Science Library

    Elsea, Jennifer K; Schwartz, Moshe; Nakamura, Kennon H

    2008-01-01

    .... In Iraq, private firms known as Private Security Contractors (PSCs) serve to protect individuals, transport convoys, forward operating bases, buildings, and other economic infrastructure, and are training Iraqi police and military personnel...

  7. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-01-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur

  8. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-07-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur. 2 refs

  9. Occupational exposure of nuclear medicine personnel

    International Nuclear Information System (INIS)

    Roessler, M.

    1982-01-01

    The results are given of measurements of the radiation burden of personnel in departments of nuclear medicine in the years 1979 to 1981 using film dosemeters and ring thermoluminescence dosemeters evaluated by the national personnel dosemeter service. The relations are examined of the exposure of hands and the preparation of radiopharmaceuticals and especially their use for examinations. Certain organizational measures are indicated for reducina radiation burden in a laboratory for the preparation of radiopharmaceuticals. The results of measurements and evaluations of radiation burden of personnel of nuclear medicine departments are confronted with conclusions published in the literature. (author)

  10. Monitoring of overalls and personnel skin contamination

    International Nuclear Information System (INIS)

    Turkin, N.F.

    1980-01-01

    Organization of monitoring of overalls and personnel skin contamination wastes is considered. The devices used for this purpose are enumerated. In sanitary sluices through which the personnel leaving the repair zone it is recommended to particularly thoroughly control hand skin contamination and most contaminated parts of overalls (sleeves, breeches lower parts, pockets, stomack region). In sanitary check points during personnel leaving the operator zone monitoring of overalls and skin contamination is performed. The overalls and other individual protective clothing are subjected to control in a special loundry before and after washing (decontamination) [ru

  11. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  12. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  13. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  14. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  15. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  16. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  17. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  18. 42 CFR 484.4 - Personnel qualifications.

    Science.gov (United States)

    2010-10-01

    ... (CONTINUED) STANDARDS AND CERTIFICATION HOME HEALTH SERVICES General Provisions § 484.4 Personnel... baccalaureate degree in social work, psychology, sociology, or other field related to social work, and has had...

  19. WebPASS Explorer (HR Personnel Management)

    Data.gov (United States)

    US Agency for International Development — WebPass Explorer (WebPASS Framework): USAID is partnering with DoS in the implementation of their WebPass Post Personnel (PS) Module. WebPassPS does not replace...

  20. Central Personnel Data File (CPDF) Status Data

    Data.gov (United States)

    Office of Personnel Management — Precursor to the Enterprise Human Resources Integration-Statistical Data Mart (EHRI-SDM). It contains data about the employee and their position, along with various...

  1. Guidelines for the calibration of personnel dosimeters

    International Nuclear Information System (INIS)

    Roberson, P.L.; Holbrook, K.L.

    1984-01-01

    This guide describes minimum acceptable performance levels for personnel dosimetry systems used at Department of Energy (DOE) facilities. The goal is to improve both the quality of radiological calibrations and the methods of comparing reported occupational doses between DOE facilities. Reference calibration techniques are defined. A standard for evaluation of personnel dosimetry systems and recommended design parameters for personnel dosimeters are also included. Approximate intervals for the radiation energies for which these guidelines are appropriate are 15 keV to 2 MeV for photons; above 0.3 MeV for beta particles; and 1 keV to 2 MeV for neutrons. An analysis of ANSI N13.11 was completed using performance evaluations of selected personnel dosimetry systems in use at DOE facilities. The results of this analysis are incorporated in the guidelines

  2. New ISO standard - personnel photographic film dosemeters

    International Nuclear Information System (INIS)

    Brabec, D.

    1980-01-01

    The ISO Standard 1757 ''Personnel Photographic Film Dosemeters'', issued in June 1980, is briefly described. UVVVR's own dosemeter developed for use in the national film dosimetry service in Czechoslovakia is evaluated in relation to this ISO Standard. (author)

  3. Personality, personnel selection, and job performance

    OpenAIRE

    Linden, Dimitri; Pelt, Dirk; Dunkel, Curtis; Born, Marise

    2017-01-01

    markdownabstractJob Performance: The term job performance can either refer to the objective or subjective outcomes one achieves in a specific job (e.g., the profit of a sales persons, the number of publications of a scientist, the number of successful operations of a surgeon) or to work-related activities (e.g., writing an article, conducting specific surgical acts). In the majority of research on this topic, job performance as an outcome is used. Personnel selection: Personnel selection refe...

  4. Personnel Audit Using a Forensic Mining Technique

    OpenAIRE

    Adesesan B. Adeyemo; Oluwafemi Oriola

    2010-01-01

    This paper applies forensic data mining to determine the true status of employees and thereafter provide useful evidences for proper administration of administrative rules in a Typical Nigerian Teaching Service. The conventional technique of personnel audit was studied and a new technique for personnel audit was modeled using Artificial Neural Networks and Decision Tree algorithms. Atwo-layer classifier architecture was modeled. The outcome of the experiment proved that Radial Basis Function ...

  5. Personnel monitoring of radiations with thermoluminescent dosemeters

    International Nuclear Information System (INIS)

    Miano, S.C.

    1987-01-01

    The basics of personnel dosimetry technics, used by the Radiologic Protetion and Assessorie Service (SAPRA) are presented, consisting on use of thermoluminescent and CaSO 4 :Dy monitors in aggregated pellets by Teflon. The characteristics of this dosemeters, relating to the sensitivity, energetic dependence, spike temperature, characteristic emission curve, decay and light effect are shown. The thermoluminescent dosemeter measure system and the personnel monitoring system are also described. (C.G.C.) [pt

  6. Technical obstacles to nuclear security - Russian perspective

    International Nuclear Information System (INIS)

    Pshakin, G.

    2005-01-01

    Full text: Present political, economical and social development the world - wide and in particular countries and regions facilitate number of serious and dangerous challenges for people responsible for security of materials and facilities, which could be used as a threat to the humankind in case of unauthorized approach. A number of factors have impact on the security including political, social, financial and technical nature. The security of nuclear materials and facilities where nuclear materials located and under processing is facing a number of problems such as control of the personnel who is handling the materials, access to the materials and the facilities, accounting and control of the materials storage, transportation, transactions, processing, physical protection of the materials. Each aspect of those problems must be taken into account for establishing most efficient way to keep the nuclear materials out of hands of the terrorists. Technical aspects which require serious and intent relation from political and technical communities in Russia (as example) are the following: legal base for nuclear materials protection, control and accounting and export control; personnel for nuclear materials control and accounting - skill, reliability, responsibility, training and new generation education; personnel for physical protection - skill, reliability, responsibility, training; structure of the system and equipment for materials control, verification, accountability; structure of the system and equipment for physical protection; regulatory supervision of the MPC+A system effectiveness. (author)

  7. Preventive medical programmes to personnel exposed to ionizing radiation

    International Nuclear Information System (INIS)

    Estrada F, E.

    1996-01-01

    The increasing use of ionizing radiation in the medical field as well as in industry and research grants has special importance to the security aspects related to the individual as well as his surroundings, reason for which the implementation of effective Occupational Radiation Protection Programmes constitutes a priority. Presently, in Guatemala, an Occupational Medicine Programme, directed to the Radiosanitary watch over of occupationally exposed personnel does not exist. It is the goal in this project to organize and establish such programme, based on protective and training actions focused toward the employee as the main entity, his specific activities and his work surroundings. Medical watch over together with Radiation Protection will permit the reduction of the occurrence probability of accidents or incidents, as well as the limitation of stochastic effects to the undermost values. The application scope of the present project is, in the first place, directed to the occupationally exposed personnel of the Direcci[n General de Energ[a Nuclear, as regulatory entity of these activities, and afterwards, its application in the different institutions which work with ionizing radiations. All the previously exposed is based on the Nuclear Legislation prevailing in Guatemala as well as the recommendations of international organizations. (author)

  8. The Financing and Personnel of the Lithuanian Army

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2015-12-01

    Full Text Available In 2014, at the beginning of the crisis in Ukraine and Russia‘s aggression against this neighboring country, Lithuania became concerned about the strengthening of its military capabilities, augmenting the National Defense System (NDS budget by almost 50% in two years. This may be considered unprecedented, if seen against the background of the presidential elections and those to the European Parliament, the fiscal discipline, the introduction of euro, as well as Russia‘s economic sanctions, the political decision in the course of 2014 on increasing the defense assignation by 130 million litas and in 2015 the increase by planned additional 356 million litas. This article analyzes two closely related problems of the Lithuanian NDS capabilities. First of all, changes in the NDS financing are explored in the context of permanent agreements of Lithuanian political parties concerning the allocation of 2% of the GDP for defense. This is followed by the discussion of the issues of military personnel staffing and training of the reserve as well as future challenges. This research contributes to the assessment of the critical NDS financing and staffing not only within academic circles but particularly among politicians and society in general. Additionally, it contributes to the awareness of the problems the army encountered in seeking to implement the objective set for it: to ensure the military security of the state. In the presence of the emerging threats in the region, this is of particularly great significance to the demilitarized and pacifist society of Lithuania. The article aims at identifying financing and personnel planning problems throughout a quarter of the century, ranging from the restoration of the Army of the Republic of Lithuania to 2014 inclusively. At the same time, the study encourages a discussion by the academic community on issues of the military security of the Lithuanian State and provides analyses as well as possible

  9. Improving human performance in maintenance personnel

    International Nuclear Information System (INIS)

    Gonzalez Anez, Francisco; Agueero Agueero, Jorge

    2010-01-01

    The continuous evolution and improvement of safety-related processes has included the analysis, design and development of training plans for the qualification of maintenance nuclear power plant personnel. In this respect, the international references in this area recommend the establishment of systematic qualification programmes for personnel performing functions or carrying out safety related tasks. Maintenance personnel qualification processes have improved significantly, and training plans have been designed and developed based on Systematic Approach to Training methodology to each job position. These improvements have been clearly reflected in recent training programmes with new training material and training facilities focused not only on developing technical knowledge and skills but also on improving attitudes and safety culture. The objectives of maintenance training facilities such as laboratories, mock-ups real an virtual, hydraulic loops, field simulators and other training material to be used in the maintenance training centre are to cover training necessities for initial and continuous qualification. Evidently, all these improvements made in the qualification of plant personnel should be extended to include supplemental personnel (external or contracted) performing safety-related tasks. The supplemental personnel constitute a very spread group, covering the performance of multiple activities entailing different levels of responsibility. Some of these activities are performed permanently at the plant, while others are occasional or sporadic. In order to establish qualification requirements for these supplemental workers, it is recommended to establish a rigorous analysis of job positions and tasks. The objective will be to identify the qualification requirements to assure competence and safety. (authors)

  10. Occupational stress among police personnel in India

    Directory of Open Access Journals (Sweden)

    G Ragesh

    2017-06-01

    Full Text Available Background: Occupational stress and associated physical and mental health related issues are not addressed in Indian police personnel with adequate importance. Methods: Cross-sectional survey was conducted among police personnel (both male and female in Calicut urban police district, Kerala state, India. Police personnel from all designations (ranks, except from the all India services (Indian Police Service were included in the study. Data were collected using a specifically designed datasheet covering socio-demographic profile, physical and mental health related details which was prepared by researchers. Occupational stress was measured using Operational Police Stress Questionnaire (PSQ-OP and Organisational Police Stress Questionnaire (PSQ-ORG. Result: The study found that both operational and organisational stress was significant among the police officers. Organisational stress was experienced in moderate level by 68% and in high level by 14%. Operational stress scores were in the moderate range in 67% and in high range in 16.5%. The younger age group (21-35 years and lower level rank police personnel had higher stress. Stress was higher among female police personnel compared to males. While 23% of them had been diagnosed with physical illnesses, a significant four per cent of them with mental illness, and 29% of them reported substance abuse. Conclusion: The results point to the high level of stress among Indian police personnel and the need for urgent interventions from the government to address the occupational stress.

  11. Assessing the Personal Financial Problems of Junior Enlisted Personnel

    National Research Council Canada - National Science Library

    Buddin, Richard

    2002-01-01

    .... Surveys of military personnel show that, particularly for junior personnel, financial problems constitute a major source of stress, subordinate only to increased workload and family separation...

  12. The tracking and locating system of the mining personnel based on the Zigbee wireless network platform

    Energy Technology Data Exchange (ETDEWEB)

    Xiao-jia, Xie; Li-jun, Cheng; Yong, Wang [Chongqing University, Chongqing (China). College of Resources and Environmental Science

    2007-08-15

    By comparing the advanced Zigbee wireless network system with active RFID, the Zigbee wireless network technology was introduced into the system for tracking and locating of coal miners. The system structure and function characteristics were also introduced. This system makes it convenient to mine administrators, control room personnel and security inspectors to obtain information on the working hours and location of mine workers in the mine. 6 refs., 2 figs., 3 tabs.

  13. An analysis of generalised heuristics for vehicle routing and personnel rostering problems

    OpenAIRE

    Mustafa Misir; Pieter Smet; Greet Vanden Berghe

    2015-01-01

    The present study investigates the performance of heuristics while solving problems with routing and rostering characteristics. The target problems include scheduling and routing home care, security and maintenance personnel. In analysing the behaviour of the heuristics and determining the requirements for solving the aforementioned problems, the winning hyper-heuristic from the first International Cross-domain Heuristic Search Challenge (CHeSC 2011) is employed. The completely new applicatio...

  14. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  15. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  16. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of Management and... safeguards for disclosure of Social Security benefit information to OPM via direct computer link for the... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  17. 78 FR 3474 - Privacy Act of 1974; Computer Matching Program Between the Office Of Personnel Management and...

    Science.gov (United States)

    2013-01-16

    ... amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), Office of... Security benefit information to OPM via direct computer link for the administration of certain programs by... OFFICE OF PERSONNEL MANAGEMENT Privacy Act of 1974; Computer Matching Program Between the Office...

  18. The European Union’s Aviation Security Mission in South Sudan

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Rodt, Annemarie Peen

    of the security situation in the country, all EU personnel were evacuated in January 2014, and the mission was (informally) terminated after fulfilling its mandated deployment period. Even though the mission had succeeded in training 350 personnel prior to the evacuation, its contribution to the overall security......When South Sudan gained independence in 2011, the new country needed assistance from external actors during the transition to prevent the security situation from deteriorating. In 2012 the EU launched its Aviation Security Mission (EUAVSEC) in South Sudan as part of its Common Security and Defence...... Policy. This came in response to a South Sudanese request for EU support and assistance in strengthening the security in Juba International Airport, as it had proven difficult for South Sudan to establish a fully operational transport hub. The EU estimated that an improvement of the airport security...

  19. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  20. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  1. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  2. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  3. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  4. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  5. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  6. Nuclear security culture: a generic model for universal application

    International Nuclear Information System (INIS)

    Khripunov, I.

    2005-01-01

    Full text: Nuclear security culture found its way into professional parlance several years ago, but still lacks an agreed-upon definition and description. The February 2005 U.S.-Russian Joint Statement, issued at the presidential summit meeting in Bratislava, referred specifically to security culture, focusing renewed attention on the concept. Numerous speakers at the March 2005 International Atomic Energy Agency's (IAEA) international conference on nuclear security referred to security culture, but their visions and interpretations were often at odds with one another. Clearly, there is a need for a generic model of nuclear security culture with universal applicability. Internationally acceptable standards in this area would be invaluable for evaluation, comparison, cooperation, and assistance. They would also help international bodies better manage their relations with the nuclear sectors in various countries. This paper will develop such a model. It will use the IAEA definition of nuclear security, and then apply Edgar Schein's model of organizational culture to security culture at a generic nuclear facility. A cultural approach to physical protection involves determining what attitudes and beliefs need to be established in an organization, how these attitudes and beliefs manifest themselves in the behavior of assigned personnel, and how desirable attitudes and beliefs can be transcribed into formal working methods to produce good outcomes, i.e., effective protection. The security-culture mechanism I will propose is broken into four major units: facility leadership, proactive policies and procedures, personnel performance, and learning and professional improvement. The paper will amplify on the specific traits characteristic of each of these units. Security culture is not a panacea. In a time of mounting terrorist threats, it should nonetheless be looked upon as a necessary organizational tool that enhances the skills of nuclear personnel and ensures that

  7. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  8. Measuring Human Performance within Computer Security Incident Response Teams

    Energy Technology Data Exchange (ETDEWEB)

    McClain, Jonathan T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Silva, Austin Ray [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Avina, Glory Emmanuel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Forsythe, James C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  9. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  10. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  11. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  12. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  13. 32 CFR 720.20 - Service of process upon personnel.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Service of process upon personnel. 720.20... DELIVERY OF PERSONNEL; SERVICE OF PROCESS AND SUBPOENAS; PRODUCTION OF OFFICIAL RECORDS Service of Process and Subpoenas Upon Personnel § 720.20 Service of process upon personnel. (a) General. Commanding...

  14. Nuclear power plant personnel training and its evaluation. A guidebook

    International Nuclear Information System (INIS)

    1996-01-01

    The Guidebook will prove especially useful for, and is addressed primarily to: nuclear power operating organizations establishing or upgrading their NPP personnel training systems; regulatory personnel responsible for setting requirements and/or evaluating NPP personnel training; and organizations (within or outside the operating organization) responsible for the development, implementation and evaluation of training programmes for NPP personnel. Figs, tabs

  15. Systematic approach to personnel neutron monitoring

    International Nuclear Information System (INIS)

    Griffith, R.V.; Hankins, D.E.

    1980-01-01

    NTA film and albedo detectors represent the major portion of personnel dosimeters now used for occupational neutron monitoring. However, recent attention to the spectral response of these systems has demonstrated the need for detectors that have a better match to the fields being monitored. Recent developments in direct recoil track etch dosimeters present some intriguing alternatives, and careful use of 237 Np fission fragment detectors offers the advantage of a good dose equivalent spectral match. Work continues on a number of other new detector mechanisms, but problems with sensitivity, energy response, gamma interference, etc., continue to prevent development of most mechanisms into viable personnel dosimeters. Current dosimeter limitations make a systematic approach to personnel neutron monitoring particularly important. Techniques have been developed and tested, using available portable survey instruments, that significantly improve the quality of dosimeter interpretation. Even simple spectrometry can be done with modest effort, significantly improving the health physicists ability to provide accurate neutron monitoring

  16. Principles for enhancing professionalism of nuclear personnel

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1989-03-01

    The management principles in this publication were developed by a committee of senior utility officials with assistance by the staff of the Institute of Nuclear Power Operations (INPO) and with input from virtually all U.S. nuclear utilities. The principles are aimed at creating an environment within a nuclear power plant that promotes a healthy respect for the unique technology that nuclear electric power represents and, thus, to promote great care and conservative, thoughtful decision-making by the nuclear plant staff. The scope of the principles includes all nuclear personnel and gives guidance in the selection and development of management and supervisory personnel and other key individuals in the areas of operations, maintenance, technical support and engineering. Utility managers are encouraged to make in-depth comparisons between these principles and their day-to-day policies and practices, and to use such efforts as opportunities to communicate their organization's management philosophy to all nuclear personnel.

  17. Health physics personnel: a need unfulfilled

    International Nuclear Information System (INIS)

    Kathren, R.L.

    1983-01-01

    For the past decade, the demand for health physics personnel, at both the professional and technical levels, has been increasing, and indeed has become quite acute in recent years. The need for health physics personnel is demonstrated by a summary of projected requirements and potential candidates by the year 1991. Suggestions made for ensuring the availability of qualified health physics personnel includes: 1) a characterization study of health physicists should be conducted, with emphasis on industry, to determine qualifications, job satisfaction factors, and other data pertinent to entry and retention in the field; 2) the curricula currently offered by post-secondary schools should be evaluated for quality and relevance; and 3) an industry standard or protocol for qualification and training of health physics should be developed and implemented

  18. Severe accident testing of a personnel airlock

    International Nuclear Information System (INIS)

    Clauss, D.B.; Parks, M.B.; Julien, J.T.; Peters, S.W.

    1988-01-01

    Sandia National Laboratories (Sandia) is investigating the leakage potential of mechanical penetrations as part of a research program on containment integrity under severe accident loads for the U.S. Nuclear Regulatory Commission (NRC). Barnes et al. (1984) and Shackelford et al. (1985) identified leakage from personnel airlocks as an important failure mode of containments subject to severe accident loads. However, these studies were based on relatively simple analysis methods. The complex structural interaction between the door, gasket, and bulkhead in personnel airlocks makes analytical evaluation of leakage difficult. In order to provide data to validate methods for evaluating the leakage potential, a full-size personnel airlock was subject to simulated severe accident loads consisting of pressure and temperature up to 300 psig and 800 degrees F. The test was conducted at Chicago Bridge and Iron under contract to Sandia. The authors provide a detailed report on the test program

  19. Principles for enhancing professionalism of nuclear personnel

    International Nuclear Information System (INIS)

    1989-01-01

    The management principles in this publication were developed by a committee of senior utility officials with assistance by the staff of the Institute of Nuclear Power Operations (INPO) and with input from virtually all U.S. nuclear utilities. The principles are aimed at creating an environment within a nuclear power plant that promotes a healthy respect for the unique technology that nuclear electric power represents and, thus, to promote great care and conservative, thoughtful decision-making by the nuclear plant staff. The scope of the principles includes all nuclear personnel and gives guidance in the selection and development of management and supervisory personnel and other key individuals in the areas of operations, maintenance, technical support and engineering. Utility managers are encouraged to make in-depth comparisons between these principles and their day-to-day policies and practices, and to use such efforts as opportunities to communicate their organization's management philosophy to all nuclear personnel

  20. Pakistan: Can the United States Secure an Insecure State?

    Science.gov (United States)

    2010-01-01

    do not have female staff; the male-to-female staff ratio in the health field is 7 to 1.130 More nurses and female staff are needed, especially to...exercise was rescheduled for 2009. 9 Interview with Ninth Air Force personnel, September 12, 2008. 200 Pakistan: Can the United States Secure an Insecure

  1. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Science.gov (United States)

    2012-07-23

    ... expatriate security company (the source is 32 CFR 159.3, section (3) of the definition of ``covered contract.... Such firms are, by definition, not small businesses because they are not U.S. firms. In the small... unpredictable high-threat environment where personnel performing security functions may be called upon to use...

  2. From personnel dose to personal dose

    International Nuclear Information System (INIS)

    Hoefert, M.; Raffnsoe, R.C.; Tuyn, J.W.N.; Wittekind, D.

    1985-01-01

    From following the development of personnel doses at CERN over the past six years it has become evident that work in areas of induced radioactivity is the principal cause of exposure. The results of photon dose measurements free-in-air and around a phantom are presented and discussed in the light of new quantities in individual monitoring. The importance of these results, with respect to the practical situation, is discussed and the problem of phantom size is mentioned. Finally, the results of dose measurements in the phantom are presented, since such information is important in cases where it becomes necessary to transform personnel doses into personal doses. (author)

  3. Qualification of nuclear power plant operations personnel

    International Nuclear Information System (INIS)

    1984-01-01

    With the ultimate aim of reducing the possibility of human error in nuclear power plant operations, the Guidebook discusses the organizational aspects, the staffing requirements, the educational systems and qualifications, the competence requirements, the ways to establish, preserve and verify competence, the specific aspects of personnel management and training for nuclear power plant operations, and finally the particular situations and difficulties to be overcome by utilities starting their first nuclear power plant. An important aspect presented in the Guidebook is the experience in training and qualification of nuclear power plant personnel in various countries: Argentina, Belgium, Canada, Czechoslovakia, France, Federal Republic of Germany, Spain, Sweden, United Kingdom and United States of America

  4. The training of the operation personnel

    International Nuclear Information System (INIS)

    Martin, H.D.

    1975-01-01

    A survey about training places and the volume of the training program for reactor personnel in the Federal Republic of Germany is given. Paragraph 7 of the atomic energy act, which imposes on the operators of nuclear energy plants the qualifired training of the personnel, is refered to. Positive experiences with the use of simulation equipment for training have led to the planning of a simulator-centre which is expected to be ready for operation in 1977. The versatile program of this centre is briefly reported. (ORU) [de

  5. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  6. PAMTRAK: A personnel and material tracking system

    International Nuclear Information System (INIS)

    Anspach, D.A.; Anspach, J.P.; Crain, B. Jr.

    1996-01-01

    There is a need for an automated system for protecting and monitoring sensitive or classified parts and material. Sandia has developed a real-time personnel and material tracking system (PAMTRAK) that has been installed at selected DOE facilities. It safeguards sensitive parts and material by tracking tags worn by personnel and by monitoring sensors attached to the parts or material. It includes remote control and alarm display capabilities and a complementary program in Keyhole to display measured material attributes remotely. This paper describes the design goals, the system components, current installations, and the benefits a site can expect when using PAMTRAK

  7. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  8. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  9. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  10. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  11. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  12. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  13. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  14. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  15. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  16. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  17. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  18. Job Attitudes of USAF Aircraft Maintenance Personnel.

    Science.gov (United States)

    1986-04-01

    SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS UNCLASSIFIED 7. SECURITY CLASSIFICATION AUTHORITY 3. OISTRIBUTION/ AVAILABILIT " OF REPORT 1...dealt with in this paper would be rather like trying to take a drink of water out of a fire hydrant when the pressure is fully or--a task beyond the

  19. Transmission Line Security Monitor: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  20. Approaches to Managing Personnel Security Enterprise During the Restructuring. Подходы к управлению кадровой безопасностью предприятия в ходе реструктуризации

    Directory of Open Access Journals (Sweden)

    Danilenko Svetlana V.

    2012-04-01

    Full Text Available The article reveals the essential elements of personnel security and risks to personnel in the field of enterprise restructuring. Factors to ensure the safety of personnel is substantiated. Definition of management personnel security company in the restructuring process, as policy in the field of human resources, economic, organizational, social and psychological measures to prevent economic damage, support the goals and values of the company, is suggested.В статье раскрыты сущностные элементы кадровой безопасности и риски, возникающие в кадровой сфере предприятия в ходе реструктуризации. Обоснованы факторы обеспечения кадровой безопасности. Предложено определение управления кадровой безопасностью предприятия в процессе реструктуризации, как такой политики в кадровой сфере, экономические, организационные и социально-психологические меры которой направлены на предотвращение экономического ущерба, поддержку целей и ценностей предприятия.

  1. Equipment for radiography in Yugoslavia - security and radiation protection

    International Nuclear Information System (INIS)

    Dobrijevic, R.; Vucina, J.

    1998-01-01

    Nondestructive method of material control by using radioisotopes is developed in Yugoslavia. This method of quality control is professionally performed by 30 firms. This paper presents the overview of the equipment used in the industrial radiography by using radioisotopes. Special attention was devoted to the security during the work and to the radiation protection of the operator and other personnel around the working place. In general it could be concluded that the main drawback which influences the security is the fact that most cases old and whom out equipment is in use. Other factors influencing the security are also discussed. (author)

  2. Face recognition in securing optical telecom network equipment

    International Nuclear Information System (INIS)

    Ali, N.M.

    2015-01-01

    In this paper, face recognition is used with a microcontroller based hardware module to secure the telecommunication equipments like ONU (optical network units) or any other telecommunication equipment. The face recognition classifier value optimization adaption is deployed and in this scheme by increasing or decreasing the number of images in the database will automatically generate and adopt the classifier value for recognition of known and unknown persons. On recognizing and unknown persons. On recognizing an unknown person, the hardware module will send an SMS to the concerned security personnel for security preventive measures. (author)

  3. Safeguarding cultural properties security for museums, libraries, parks, and zoos

    CERN Document Server

    Layne, Stevan P

    2014-01-01

    Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic s

  4. LANSCE radiation security system (RSS)

    International Nuclear Information System (INIS)

    Gallegos, F.R.

    1996-01-01

    The Radiation Security System (RSS) is an engineered safety system which automatically terminates transmission of accelerated ion beams in response to pre-defined abnormal conditions. It is one of the four major mechanisms used to protect people from radiation hazards induced by accelerated pulsed ion beams at the Los Alamos Neutron Science Center (LANSCE). The others are shielding, administrative policies and procedures, and qualified, trained personnel. Prompt radiation hazards at the half-mile long LANSCE accelerator exist due to average beam intensities ranging from 1 milli-amp for H + beam to 100 micro-amps for the high intensity H - beam. Experimental programs are supplied with variable energy (maximum 800 MeV), pulse-width (maximum 1 msec), and pulse frequency (maximum 120 Hz) ion beams. The RSS includes personnel access control systems, beam spill monitoring systems, and beam current level limiting systems. It is a stand-alone system with redundant logic chains. A fault of the RSS will cause the insertion of fusible beam plugs in the accelerator low energy beam transport. The design philosophy, description, and operation of the RSS are described in this paper

  5. Emergency team personnel and technical equipment

    International Nuclear Information System (INIS)

    Muralt, R.

    1989-01-01

    The most important requirements for the emergency team can be summarized in three points. 1) The emergency team must be made up of top personnel from all fields and it should be functionally equiped. 2) The emergency teams must have complete command of their equipment. 3) The members of the team must be well motivated. 1 fig

  6. 50 CFR 260.104 - Personnel.

    Science.gov (United States)

    2010-10-01

    ... belongings, eat food, drink beverages, chew gum, or use tobacco in any form in areas where food or food... FOOD PRODUCTS INSPECTION AND CERTIFICATION Inspection and Certification of Establishments and Fishery... Basis 1 § 260.104 Personnel. The establishment management shall be responsible for taking all...

  7. Personnel radiation dosimetry symposium: program and abstracts

    Energy Technology Data Exchange (ETDEWEB)

    1984-10-01

    The purpose was to provide applied and research dosimetrists with sufficient information to evaluate the status and direction of their programs relative to the latest guidelines and techniques. A technical program was presented concerning experience, requirements, and advances in gamma, beta, and neutron personnel dosimetry.

  8. Job Attitudes of Military Airlift Command Personnel

    Science.gov (United States)

    1986-04-01

    nutbers of available youth. John haisbitt, author of Megatrends, predicts that labor short.ges are beginning to occur and will continue throughout the...available resources (e.g., personnel and material). 81. Your work group’s performance in compariscn to similar work groups is very high. ORGANIZATION CLIMA "E

  9. 42 CFR 485.705 - Personnel qualifications.

    Science.gov (United States)

    2010-10-01

    ... Physical Therapy and Speech-Language Pathology Services § 485.705 Personnel qualifications. (a) General... involved in the furnishing of outpatient physical therapy, occupational therapy, and speech-language...) of the Act and the requirements in part 484 of this chapter. (2) For a speech-language pathologist...

  10. Health matters in hiring and retaining personnel

    NARCIS (Netherlands)

    Houtman, I.L.D.

    2014-01-01

    Health is the most important issue when an employer is deciding whether to hire a worker, according to a new study from the Netherlands. The research looked at the results of a ‘vignette’ study on employer preferences when hiring or retaining personnel. It also showed that when an employer is

  11. Personnel radiation dosimetry symposium: program and abstracts

    International Nuclear Information System (INIS)

    1984-10-01

    The purpose was to provide applied and research dosimetrists with sufficient information to evaluate the status and direction of their programs relative to the latest guidelines and techniques. A technical program was presented concerning experience, requirements, and advances in gamma, beta, and neutron personnel dosimetry

  12. 21 CFR 606.20 - Personnel.

    Science.gov (United States)

    2010-04-01

    ... GOOD MANUFACTURING PRACTICE FOR BLOOD AND BLOOD COMPONENTS Organization and Personnel § 606.20... testing, storage or distribution of blood or blood components shall be adequate in number, educational... areas where the collection, processing, compatibility testing, storage or distribution of blood or blood...

  13. Changing Role of the Personnel Manager

    Science.gov (United States)

    Schein, Edgar H.

    1975-01-01

    Arguing that the personnel manager will increasingly have to become a change agent and process consultant, the author discusses tasks involved and skills required for the new role. A shift in focus toward top management as the primary client and utilization of more flexible intervention into organizational processes are predicted. (JT)

  14. Strategic personnel management in an educational institution

    OpenAIRE

    KOROTKOVA M.V.; RYBKINA M.V.; NIKITINA S.O.; SCHERNYKH A.V.

    2016-01-01

    The article analyzes the strategic human resource management in an educational institution. Analyzes the basic normative-legal documents regulating educational activities, including the part of management. Particular importance is given to the types of educational institutions (budgetary, state, and autonomous). The stages of strategic management of staff in educational institutions and development model of strategic management personnel are shown.

  15. SAPLE: Sandia Advanced Personnel Locator Engine.

    Energy Technology Data Exchange (ETDEWEB)

    Procopio, Michael J.

    2010-04-01

    We present the Sandia Advanced Personnel Locator Engine (SAPLE) web application, a directory search application for use by Sandia National Laboratories personnel. SAPLE's purpose is to return Sandia personnel 'results' as a function of user search queries, with its mission to make it easier and faster to find people at Sandia. To accomplish this, SAPLE breaks from more traditional directory application approaches by aiming to return the correct set of results while placing minimal constraints on the user's query. Two key features form the core of SAPLE: advanced search query interpretation and inexact string matching. SAPLE's query interpretation permits the user to perform compound queries when typing into a single search field; where able, SAPLE infers the type of field that the user intends to search on based on the value of the search term. SAPLE's inexact string matching feature yields a high-quality ranking of personnel search results even when there are no exact matches to the user's query. This paper explores these two key features, describing in detail the architecture and operation of SAPLE. Finally, an extensive analysis on logged search query data taken from an 11-week sample period is presented.

  16. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  17. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  18. Competency assessments for nuclear industry personnel

    International Nuclear Information System (INIS)

    2004-04-01

    In 1996, the IAEA published Technical Reports Series No. 380, Nuclear Power Plant Personnel Training and its Evaluation: A Guidebook. This publication provides guidance for the development, implementation and evaluation of training programmes for all nuclear power plant personnel using the systematic approach to training (SAT) methodology. The SAT methodology has since been adopted and used for the development and implementation of training programmes for all types of nuclear facility and activities in the nuclear industry. The IAEA Technical Working Group on Training and Qualification of Nuclear Power Plant Personnel recommended that an additional publication be prepared to provide further guidance concerning competency assessments used for measuring the knowledge, skills and attitudes of personnel as the result of training. This publication has been prepared in response to that recommendation. A critical component of SAT (as part of the implementation phase) is the assessment of whether personnel have achieved the standards identified in the training objectives. The nuclear industry spends a significant amount of resources conducting competency assessments. Competency assessments are used for employee selection, trainee assessment, qualification, requalification and authorization (in some Member States the terminology may be 'certification' or 'licensing'), and job advancement and promotion. Ineffective testing methods and procedures, or inappropriate interpretation of test results, can have significant effects on both human performance and nuclear safety. Test development requires unique skills and, as with any skill, training and experience are needed to develop and improve them. Test item and examination development, use, interpretation of results and examination refinement, like all other aspects of SAT, should be part of an ongoing, systematic process. This publication is primarily intended for use by personnel responsible for developing and administering

  19. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  20. Towards harmonized qualifications for radiation exposed personnel

    International Nuclear Information System (INIS)

    Briso, Hugo A.

    2008-01-01

    The accelerated process of globalization affecting mankind doesn't exclude safety matters. Indeed, some trans national corporations are increasingly offering specialized engineering services such as industrial radiography or well lodging. As well, a growing scientific exchange involves the mobility of nuclear researchers in different areas, for instance radiochemistry, nuclear medicine and radiotherapy. Such a breakdown in the technological frontiers must necessarily be reflected by the regulatory solutions. Particularly, diverse levels of theoretical-practical training for radiation exposed personnel coexist in the Latin-American Region, being an especially sensitive problem for radiation protection matters. The spectrum goes from post-graduate courses required for radiation protection officers in some countries, while in others only basic recommendations are required for the operating personnel. Another scheme consists of medium level course for the operating personnel, while radiation protection officers don't have special requirements. Many educational private institutions teach non standardized courses which only give broad concepts of radiation protection. On the other hand, usually nothing is said about the operational training, or else its certification is entrusted to the employer itself. In some countries multiple Regulatory Authorities apply dissimilar criteria to assess safety matters, including the evaluation of workers applications. The necessary regional integration makes indispensable to establish common standards for granting authorizations. Having similar or homogeneous requirements for the universe of radiation exposed personnel, i.e. source operators, radiation protection officers, qualified experts and technical support people would be easier for the Regulatory Authorities to have common methodologies of evaluation for the applicants. An IAEA supported technical cooperation project related to this paper seeks to establish standardized

  1. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  2. Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat

    Science.gov (United States)

    2016-06-10

    personnel, outside of military police and DoD-contracted civilian LE, to provide an additional layer of security in the workplace . Augmented security does...Research, context, and conclusions from this study may prove that seemingly riskier, yet more secure; measures exist to further empower installation...commanders with safeguarding DoD men and women from active shooter attacks. Conclusion DoD leadership and commanders at all levels have the

  3. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  4. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  5. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  6. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  7. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  8. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  9. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  10. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  11. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  12. Job Satisfaction and its Influencing Factors among Shomal Health Center of Tehran Personnel in 2014

    Directory of Open Access Journals (Sweden)

    Mohammad-Hossein Safi

    2016-03-01

    Full Text Available Background and Objective: Job satisfaction is an important variable in the area of organizational behavior. Without job satisfaction it is not possible to achieve organizational goals. Therefore the purpose of this study was to assess job satisfaction among Shomal health center of Tehran personnel affiliated to Shahid Beheshti University of Medical Sciences.Materials and Methods: This cross- sectional study was a descriptive-analytical one. Shomal health center of Tehran personnel with at least six months of work experience participated in the study. Data were collected by demographic characteristics and the Minnesota Satisfaction questionnaire. Job satisfaction was categorized into six areas and five levels. Reliability of the questionnaire was confirmed through Chronbach’s alpha calculation. Statistical analysis was conducted using SPSS-18 software.Results: Two hundreds and Fifty-nine personnel participated in the study. The mean (SD of overall satisfaction score was 50.1(12.3 from 100. The study showed that job satisfaction of financial facilities and welfare, educational facilities and job promotion, politics and policy management, quality of human relations, Job security and professional social status were 40%, 43.4%, 53.4%, 66.6%, 54.3% and 57.4%, respectively. Statistical analysis showed a significant relationship between gender and occupational field.Conclusion:  Improving the physical conditions at workplace, increasing employee participation in decision-making, the relative increase in salary, Encouraging personnel, job promotion and intimate relationships between them can lead to increase job satisfaction among employees.

  13. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  14. Managing personnel security in the context of socio-economic development of an organisation Управление кадровой безопасностью в контексте социально-экономического развития организации

    Directory of Open Access Journals (Sweden)

    Semenchenko Andrey V.

    2013-01-01

    Full Text Available The article considers key aspects of managing personnel security, identifies factors of influence upon specific features of managing personnel security of an organisation. It marks that objective factors are such activity of which does not depend on economic behaviour of individual employers, that is why they should neutralise them using special methods. The article studies strategic goals and priorities, which reduce personnel security of a modern company. It reveals that an important factor of deterioration of personnel security is non-efficiency of the system of managing personnel in an organisation. When speaking about object domain, this influence manifests itself in two forms: at strategic and operative levels of management. The article also reveals threats of personnel security of an organisation in spheres, which are most important for Ukraine in accordance with branch specific features and in various spheres of professional activity, which identifies probability of realisation of threat factors.В статье рассмотрены ключевые аспекты управления кадровой безопасностью, определены факторы влияния на особенности управления кадровой безопасностью организации. Отмечено, что к объективным относятся факторы, действие которых не зависит от хозяйственного поведения конкретных работодателей, поэтому они должны нейтрализовать их специальными методами. В работе исследованы стратегические цели и приоритеты, которые снижают кадровую безопасность современного предприятия. Выявлено, что весомым фактором снижения к

  15. Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training.

    Science.gov (United States)

    de Gramatica, Martina; Massacci, Fabio; Shim, Woohyun; Turhan, Uğur; Williams, Julian

    2017-02-01

    We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi-structured interviews. Our model extends previous principal-agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high-risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives. © 2016 Society for Risk Analysis.

  16. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  17. Scheduling nursing personnel on a microcomputer.

    Science.gov (United States)

    Liao, C J; Kao, C Y

    1997-01-01

    Suggests that with the shortage of nursing personnel, hospital administrators have to pay more attention to the needs of nurses to retain and recruit them. Also asserts that improving nurses' schedules is one of the most economic ways for the hospital administration to create a better working environment for nurses. Develops an algorithm for scheduling nursing personnel. Contrary to the current hospital approach, which schedules nurses on a person-by-person basis, the proposed algorithm constructs schedules on a day-by-day basis. The algorithm has inherent flexibility in handling a variety of possible constraints and goals, similar to other non-cyclical approaches. But, unlike most other non-cyclical approaches, it can also generate a quality schedule in a short time on a microcomputer. The algorithm was coded in C language and run on a microcomputer. The developed software is currently implemented at a leading hospital in Taiwan. The response to the initial implementation is quite promising.

  18. Training of power plant operating personnel

    International Nuclear Information System (INIS)

    Kraftwerksschule, E.V.

    1986-01-01

    In Germany, professional training of power plant operating personnel became an important issue in the fifties, when power plant parameters as well as complexity of instrumentation and control increased considerably. Working Groups of VGB Technische Vereiningung der Grosskraftwerketreiber e.v. (Association of Large Power Plant Operators) developed a professional career for power plant operating personnel and defined pre-requisites, scope and objectives of training. In 1957 the German utilities founded KRAFTWERKSSCHULE E.V. (kws) as a school for theoretical training and for guidance of practical training in the power plants. KWS is a non-profit organisation and independent of authorities. Today KWS has 127 members in Germany and in 6 other countries. The objectives of KWS include the training of: -Kraftwerker (control room operators; - Kraftwerksmesiter (shift supervisors); and - shift engineers; according the guidelines of the VGB

  19. Personnel Selection Using Fuzzy Axiomatic Design Principles

    Directory of Open Access Journals (Sweden)

    Anant V. Khandekar

    2016-09-01

    Full Text Available Overall competency of the working personnel is often observed to ultimately affect the productivity of an organization. The globalised competitive atmosphere coupled with technological improvements demands for efficient and specialized manpower for the industrial operations. A set of typical technological skills and attitudes is thus demanded for every job profile. Most often, these skills and attitudes are expressed imprecisely and hence, necessitating the support of fuzzy sets for their effective understanding and further processing. In this paper, a method based on fuzzy axiomatic design principles is applied for solving the personnel selection problems. Selecting a middle management staff of a service department for a large scale organization is demonstrated here as a real life example. Five shortlisted candidates are assessed with respect to a set of 18 evaluation criteria, and the selection committee with experts from the related fields also realizes the outcome of the adopted approach to be quite appropriate, befitting and in agreement with their expectations.

  20. Survey of international personnel radiation dosimetry programs

    International Nuclear Information System (INIS)

    Swaja, R.E.

    1985-04-01

    In September of 1983, a mail survey was conducted to determine the status of external personnel gamma and neutron radiation dosimetry programs at international agencies. A total of 130 agencies participated in this study including military, regulatory, university, hospital, laboratory, and utility facilities. Information concerning basic dosimeter types, calibration sources, calibration phantoms, corrections to dosimeter responses, evaluating agencies, dose equivalent reporting conventions, ranges of typical or expected dose equivalents, and degree of satisfaction with existing systems was obtained for the gamma and neutron personnel monitoring programs at responding agencies. Results of this survey indicate that to provide the best possible occupational radiation monitoring programs and to improve dosimetry accuracy in performance studies, facility dosimetrists, regulatory and standards agencies, and research laboratories must act within their areas of responsibility to become familiar with their radiation monitoring systems, establish common reporting guidelines and performance standards, and provide opportunities for dosimetry testing and evaluation. 14 references, 10 tables

  1. Simulators for training nuclear power plant personnel

    International Nuclear Information System (INIS)

    1993-01-01

    Simulator training and retraining of operations personnel is essential for their acquiring the necessary knowledge, skills and qualification for operating a nuclear power plant, and for effective feedback of experience including human based operating errors. Simulator training is the most effective way by far of training operations personnel in co-operation and communication in a team, which also involves instilling attitudes and approaches for achieving excellence and individual responsibility and alertness. This technical document provides guidance to Member States on the procurement, setting up and utilization of a simulator training centre; it will also be useful for organizations with previous experience in the use of simulators for training. The document is the result of a series of advisory and consultants meetings held in the framework of the International Working Group on Nuclear Power Plant Control and Instrumentation in 1989-1992. 17 refs, 2 tabs

  2. Basic training of nuclear power reactor personnel

    International Nuclear Information System (INIS)

    Palabrica, R.J.

    1981-01-01

    The basic training of nuclear power reactor personnel should be given very close attention since it constitutes the foundation of their knowledge of nuclear technology. Emphasis should be given on the thorough understanding of basic nuclear concepts in order to have reasonable assurance of successful assimilation by those personnel of more specialized and advanced concepts to which they will be later exposed. Basic training will also provide a means for screening to ensure that those will be sent for further spezialized training will perform well. Finally, it is during the basic training phase when nuclear reactor operators will start to acquire and develop attitudes regarding reactor operation and it is important that these be properly founded. (orig.)

  3. [Education and Training of Personnel in Morphology].

    Science.gov (United States)

    Katagiri, Hisako; Yamagata, Junko

    2016-02-01

    We introduce our efforts to utilize education, training, competence assessment, and quality control of personnel engaged in urinary sediment and blood cell morphology examinations in our laboratory. There are no standard samples for these morphological examinations, and standardization has not been completed for all types of blood cells or urinary sediment components. We had been carrying out simultaneous microscopic examination involving trainee staff and senior laboratory technologists as a means of education and evaluation, but acceptance criteria were unclear. Moreover, we had continued our operation without assessment of the level of achievement of routine works or the competence of individual staff members. Taking the opportunity of receiving ISO 15189 certification, we have been able to establish clear standards for evaluating personnel education and training in morphological examinations. We will continuously make efforts to maintain and manage this system.

  4. Training of nuclear power plant operating personnel

    International Nuclear Information System (INIS)

    Anon.

    1980-04-01

    A collection is presented containing 11 papers submitted at a conference on the selection and education of specialists for operation and maintenance of nuclear power plants. The conference was attended by specialists from universities and colleges, research institutes and production plants. It debated the methods and aims of both general and specialized theoretical and practical personnel education, the proposals for teaching centre equipment, the use of simulators, computers and other aids in the teaching process; training on school reactors was included. A proposal was put forward of the system of education, the teaching process itself, the content of the basic theoretical subjects, and the method of testing pupils' knowledge. The importance was stressed of establishing a national coordination centre to safeguard the syllabus, methodology, teaching aids, and also the training proper. The system of personnel education in the Paks nuclear power plant, Hungary, is presented as an example. (M.S.)

  5. The LLNL CR-39 personnel neutron dosimeter

    International Nuclear Information System (INIS)

    Hankins, D.E.; Homann, S.; Westermark, J.

    1987-01-01

    We developed a personnel neutron dosimetry system based on the electrochemical etching of CR-39 plastic at elevated temperatures. The doses obtained using this dosimeter system are more accurate than those obtained using other dosimetry systems, especially when varied neutron spectra are encountered. This CR-39 dosimetry system does not have the severe energy dependence that exists with albedo neutron dosimeters or the fading and reading problems encountered with NTA film. 3 refs., 4 figs

  6. Evaluation of Personnel Dosimetry data in Guatemala

    International Nuclear Information System (INIS)

    Guillen, J.A.

    2002-01-01

    The purpose of this report is to present the evaluated data from external exposures of 1268 radiation workers in Guatemala carried out in the period of 1997-2000. The collective dose in medicine, industry and other applications shown a tendency to increase in the period of study, radiology is the practice that shown a trend to decrease, that could be explained as a result of inspections and personnel training carried out in this practice

  7. Personnel education and training at Bohunice NPP

    International Nuclear Information System (INIS)

    Malovec, J.

    1998-01-01

    Procedure for education and training of all the personnel employed at Bohunice Nuclear power plant is presented in detail describing the training system structure, kinds of training, staff members qualification development, short term and long term tasks needed to assure attaining the training objectives. The proposed Staff Members Lifetime education implementation project contains basic starting points, measures to be implemented by 1998. It was prepared on the basis of a primary analysis which confirmed the existing need for implementing the lifetime education system

  8. TRAINING ON PERSONNEL MANAGEMENT AND LABOR ECONOMICS

    Directory of Open Access Journals (Sweden)

    Marina V. Polevaya

    2016-01-01

    Full Text Available The article deals with the training of spe-cialists in the eld of labor and the house-keeper personnel management within the federal state educational standards of higher education. The analysis of the possibility of training in these specialties in the various educational standards. The necessity of focusing on the prepara-tion of these destinations within certain standards.

  9. A pocket type thermoluminescent personnel dosimeter

    International Nuclear Information System (INIS)

    Vora, K.G.; Nagpal, J.S.; Pendurkar, H.K.; Gangadharan, P.

    1979-01-01

    A pocket type thermoluminescent personnel dosemeter using CaSO 4 : Dy phosphor is described. Two glass capillaries containing the phosphor are fitted into a plastic tube and covered by a cylindrical filter. The combination is fitted into an ink barrel of a fountain pen. The response of this Dy glass dosimeter was studied for various incident photon energies. A uniform response over the energy range from 33 keV to 1250 keV is achieved. (A.K.)

  10. Hanford personnel dosimeter supporting studies FY-1981

    International Nuclear Information System (INIS)

    1982-08-01

    This report examined specific functional components of the routine external personnel dosimeter program at Hanford. Components studied included: dosimeter readout; dosimeter calibration; dosimeter field response; dose calibration algorithm; dosimeter design; and TLD chip acceptance procedures. Additional information is also presented regarding the dosimeter response to light- and medium-filtered x-rays, high energy photons and neutrons. This study was conducted to clarify certain data obtained during the FY-1980 studies

  11. Requirement profile for nuclear power station personnel

    International Nuclear Information System (INIS)

    Roeglin, H.C.

    1984-01-01

    The starting point in deriving the requirement profile for the shift personnel in the control rooms of nuclear power stations is information of a technical, organisational and ergonomic kind. The technique used, the distribution of work to different work areas and the configuration of the workplace is determined by the tasks and the environmental conditions in which they have to be done. (orig./DG) [de

  12. Background dose subtraction in personnel dosimetry

    International Nuclear Information System (INIS)

    Picazo, T.; Llorca, N.; Alabau, J.

    1997-01-01

    In this paper it is proposed to consider the mode of the frequency distribution of the low dose dosemeters from each clinic that uses X rays as the background environmental dose that should be subtracted from the personnel dosimetry to evaluate the doses due to practice. The problems and advantages of this indirect method to estimate the environmental background dose are discussed. The results for 60 towns are presented. (author)

  13. To all members of the personnel

    CERN Multimedia

    2005-01-01

    Temporary work for children of members of the personnel During the period mid-June to mid-September 2005, a limited number of vacancies for temporary work at CERN (normally unskilled work of a routine nature) will be available to children of members of the personnel (i.e. anyone holding an employment or association contract with CERN). It should be noted that candidates must be aged between 18 and 24 inclusive on the first day of the contract, and that they must have insurance cover for both illness and accident. In view of the limited number of vacancies available, no children having previously worked at CERN under this scheme can be considered. The duration of all appointments will be 4 weeks and the allowance for the period will be CHF 1621.- net. Candidates should apply via the HR Department's electronic recruitment system (E-rt) : http://humanresources.web.cern.ch/humanresources/internal/personnel/pmd/cr/Staff-kids-05.pdf Completed application forms must be returned to this Service by 8 April 2005 ...

  14. TO ALL MEMBERS OF THE PERSONNEL

    CERN Multimedia

    2003-01-01

    Temporary work for children of members of the personnel During the period mid-June to mid-September 2003, there will be a limited number of vacancies for temporary work at CERN (normally unskilled work of routine nature) which will be made available to children of members of the personnel (i.e. anyone holding an employment or association contract with CERN). It should be noted that candidates must be aged between 18 and 24 inclusive on the first day of the contract, and that they must have insurance cover for both illness and accident. In view of the limited number of vacancies available, no children previously appointed at CERN under this scheme can be considered. The duration of all appointments will be 4 weeks, the allowance being CHF 1582.- for this period. Application form can be obtained from Martine PLAZA, HR Division (by using the slip in the bulletin or by electronic mail to Martine.Plaza@cern.ch) or at http://cern.ch/hr-web/internal/general/HN-personnel/ Completed application forms must be returne...

  15. TO ALL MEMBERS OF THE PERSONNEL

    CERN Multimedia

    2003-01-01

    Temporary work for children of members of the personnel During the period mid-June to mid-September 2003, there will be a limited number of vacancies for temporary work at CERN (normally unskilled work of routine nature) which will be made available to children of members of the personnel (i.e. anyone holding an employment or association contract with CERN). It should be noted that candidates must be aged between 18 and 24 inclusive on the first day of the contract, and that they must have insurance cover for both illness and accident. In view of the limited number of vacancies available, no children previously appointed at CERN under this scheme can be considered. The duration of all appointments will be 4 weeks, the allowance being CHF 1582.- for this period. Application form can be obtained from Martine PLAZA, HR Division (by electronic mail to Martine.Plaza@cern.ch) or at http://cern.ch/hr-web/internal/general/HN-personnel/ Completed application forms must be returned to this service by 2 May 2003 at th...

  16. TO ALL MEMBERS OF THE PERSONNEL

    CERN Multimedia

    2003-01-01

    Temporary work for children of members of the personnel During the period mid-June to mid-September 2003, there will be a limited number of vacancies for temporary work at CERN (normally unskilled work of routine nature) which will be made available to children of members of the personnel (i.e. anyone holding an employment or association contract with CERN). It should be noted that candidates must be aged between 18 and 24 inclusive on the first day of the contract, and that they must have insurance cover for both illness and accident. In view of the limited number of vacancies available, no children previously appointed at CERN under this scheme can be considered. The duration of all appointments will be 4 weeks, the allowance being CHF 1582.- for this period. Application form can be obtained from Martine PLAZA, HR Division (by electronic mail to Martine.Plaza@cern.ch) or at http://cern.ch/hr-web/internal/general/HN-personnel/ Completed application forms must be returned to this service by 2 May 2003 at t...

  17. Preschool Personnel Exposure to Occupational Noise

    Directory of Open Access Journals (Sweden)

    Kaļužnaja Darja

    2016-10-01

    Full Text Available Increased noise, which is also below the occupational exposure values and is “hearing safe” noise, affects the exposed person’s health as a non-specific stressor. Increased noise level also creates an environment for additional vocal apparatus load. The objective of this study was to determine preschool personnel occupational noise and its relationship with subjective health complaints. Data were obtained with survey assistance through subjective answers of respondents about health complaints and noise exposure among Rīga preschool personnel. Objective noise measurements were made to assess real noise levels in the preschool environment. Data from 155 respondents and objective measurements of 37 preschool classrooms were obtained. The results showed that the average 8-h noise exposure among Rīga preschool educational institutions was 70 dB(A, which did not exceed the Latvian work environment noise limits, but exceeded the 35–40 dB(A noise limit in the educational environment guidelines recommended by the WHO. The survey results showed that loud noise is one of the most important workplace environmental factors (~70% of respondents feel a necessity to increase voice because of noise. A constant feeling of fatigue, headache, irritable feeling, and a desire to isolate oneself from others more often occurred in respondents exposed to increased noise, compared with those who noted that they were not exposed to increased noise. In general, loud noise was associated with increased subjective health complaints in preschool education institution personnel.

  18. Experience from training of personnel abroad

    International Nuclear Information System (INIS)

    Otcenasek, P.

    1983-01-01

    In the first period of the development of nuclear technology specialists received mainly theoretical training in brief study courses and training sessions. These courses did not place high demands on training methods. In the subsequent period long-term, well-conceived and costly systems of training were developed placing emphasis on specialized knowledge and especially on practical training. The third stage has now been launched which is characterized by the departure from classical control rooms to data collection and processing in centralized information systems, selective recording according to situation and choice, etc. This stage is passing on to the system of the minimization of the human factor error. A significant problem of the human factor in nuclear technology is the time aspect. Schools specializing in the education and training of specialists, technical personnel and workers for the nuclear programme have been established. Following such education personnel are selected for specialized training in training centres which have been equipped with costly training equipment including simulators. With regard to the importance of the human factor in nuclear installations, control computers are being introduced to an increasing extent and individuals and groups of workers and personnel are trained in operation. (E.S.)

  19. NPP Krsko simulator training for operations personnel

    International Nuclear Information System (INIS)

    Pribozic, F.; Krajnc, J.

    2000-01-01

    Acquisition of a full scope replica simulator represents an important achievement for Nuclear power Plant Krsko. Operating nuclear power plant systems is definitely a set of demanding and complex tasks. The most important element in the goal of assuring capabilities for handling such tasks is efficient training of operations personnel who manipulate controls in the main control room. Use of a simulator during the training process is essential and can not be substituted by other techniques. This article gives an overview of NPP Krsko licensed personnel training historical background, current experience and plans for future training activities. Reactor operator initial training lasts approximately two and a half years. Training is divided into several phases, consisting of theoretical and practical segments, including simulator training. In the past, simulator initial training and annual simulator retraining was contracted, thus operators were trained on non-specific full scope simulators. Use of our own plant specific simulator and associated infrastructure will have a significant effect on the operations personnel training process and, in addition, will also support secondary uses, with the common goal to improve safe and reliable plant operation. A regular annual retraining program has successfully started. Use of the plant specific simulator assures consistent training and good management oversight, enhances conformity of operational practices and supports optimization of operating procedures. (author)

  20. Evaluation of the nuclear security culture

    International Nuclear Information System (INIS)

    Spitalnik, Jorge

    2003-01-01

    The security culture of an organization resides in its workers and it is expressed by the way the personnel that works in a particular organization practice daily its activities. The security culture can be practice in a high or in a low level, but it always exists and it can always be improved. It is based on the security condition and procedures that have been established in the planning phase and in the implementation of a project. After its implantation, in order to avoid deterioration, basically it is necessary to maintain and to bring updated those conditions and procedures through strategies of follow up and control. This process establishes the basis of a program of maintenance and improvement of the Security Culture. Many self-evaluations that have been accomplished at nuclear organizations based on workers perception concerning working conditions and management environment, have permitted objectively determine if the security doctrine, which the organization assure to follow rigorously into its dally activities, is really so (LS)

  1. Personnel Recruitment and Retention Strategies in Lagos State Civil ...

    African Journals Online (AJOL)

    Personnel Recruitment and Retention Strategies in Lagos State Civil Service of Nigeria. ... The results show that the strategy for personnel recruitment into the CS is based on mixtures of merit and political ... AJOL African Journals Online.

  2. Personnel management and job satisfaction in academic libraries: a ...

    African Journals Online (AJOL)

    Personnel management and job satisfaction in academic libraries: a case study of ... the level of staff development, identify the motivational factors of the library personnel, ... Questionnaire was used for this research as the main data collection ...

  3. Selected references on thermoluminescent dosemeters for personnel monitoring

    International Nuclear Information System (INIS)

    Lawson, Helen

    1976-08-01

    This bibliography contains references on: specific thermoluminescent dosemeters used for personnel dosimetry; comparisons of thermoluminescent and other dosemeters for personnel monitoring and read-out apparatus for thermoluminescent dosemeters. An appendix contains selected foreign language references. (author)

  4. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  5. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  6. History of physical security R and D

    International Nuclear Information System (INIS)

    Myre, W.C.; De Montmollin, J.M.

    1987-01-01

    Serious concern about physical protection of nuclear facilities began around 1972. R and D was initiated at Sandia National Laboratory which had developed techniques to protect weapons for many years. Special vehicles, convoy procedures, and a communications system previously developed for weapons shipments were improved and extended for shipments of other sensitive materials. Barriers, perimeter alarms, portal and internal control systems were developed, tested, and published in handbooks and presented at symposia. Training programs were initiated for U.S. and foreign personnel. Containment and surveillance techniques were developed for the IAEA. Presently emphasis is on computer security, active barriers, and techniques to prevent theft or sabotage by ''insiders''

  7. Critical Uses of College Resources. Part I: Personnel Utilization System.

    Science.gov (United States)

    Vlahos, Mantha

    A Personnel Utilization System has been designed at Broward Community College, which combines payroll, personnel, course, and function information in order to determine the actual duties performed by personnel for the amount of remuneration received. Objectives of the system are (1) to define the tasks being performed by faculty, staff, and…

  8. 25 CFR 38.12 - Leave system for education personnel.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Leave system for education personnel. 38.12 Section 38.12 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION EDUCATION PERSONNEL § 38.12 Leave system for education personnel. (a) Full-time school-term employees. Employees on a full-time school-term...

  9. Personnel monitoring system by thermoluminescence dosimeter - a study and review

    International Nuclear Information System (INIS)

    Iyer, V.S.; Alok, M.; Chandel, B.S.

    2018-01-01

    The principle objective of personnel monitoring system is to prevent overexposure and avoid unnecessary exposure of personnel working with various sources of radiation. The adequate system of personnel monitoring must provide for the measurement. evaluation and recording of significant doses accumulated by individuals together with a recording of conditions under which these doses are received

  10. 45 CFR 201.11 - Personnel merit system review.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Personnel merit system review. 201.11 Section 201... STATES FOR PUBLIC ASSISTANCE PROGRAMS Review and Audits § 201.11 Personnel merit system review. A personnel merit system review is carried out by the Office of State Merit Systems of the Office of the...

  11. 49 CFR 1542.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1542.217 Section 1542... Law enforcement personnel. (a) Each airport operator must ensure that law enforcement personnel used... the criminal laws of the State and local jurisdictions in which the airport is located— (1) A crime...

  12. 49 CFR 1544.217 - Law enforcement personnel.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Law enforcement personnel. 1544.217 Section 1544... AND COMMERCIAL OPERATORS Operations § 1544.217 Law enforcement personnel. (a) The following applies to... for law enforcement personnel meeting the qualifications and standards specified in §§ 1542.215 and...

  13. 9 CFR 590.560 - Health and hygiene of personnel.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Health and hygiene of personnel. 590.560 Section 590.560 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF..., Processing, and Facility Requirements § 590.560 Health and hygiene of personnel. (a) Personnel facilities...

  14. 30 CFR 77.1400 - Personnel hoists and elevators.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Personnel hoists and elevators. 77.1400 Section 77.1400 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY AND HEALTH MANDATORY SAFETY STANDARDS, SURFACE COAL MINES AND SURFACE WORK AREAS OF UNDERGROUND COAL MINES Personnel Hoisting § 77.1400 Personnel...

  15. Perspectives of NPP personnel training in the future?

    International Nuclear Information System (INIS)

    Khess, R.E.

    1996-01-01

    Problems of the NPP personnel education are discussed during radical reorganization of the state regulation of energy production and distribution when nuclear energetics will appears in the market conditions. Effective methods of the NPP personnel training developed by the corporation GPU Nuclear are given. Potentials of the application of simulators and computerized programs for increasing the NPP personnel education efficiency are considered

  16. Annual individual doses for personnel dealing with ionizing radiation sources

    International Nuclear Information System (INIS)

    Poplavskij, K.K.

    1982-01-01

    Data on annual individual doses for personnel of national economy enterprises, research institutes, high schools, medical establishments dealing with ionizing radiation sources are presented. It is shown that radiation dose for the personnel constitutes only shares of standards established by sanitary legislation. Numeral values of individual doses of the personnel are determined by the type, character and scope of using ionizing radiation sources

  17. 34 CFR 76.659 - Use of public school personnel.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Use of public school personnel. 76.659 Section 76.659... Be Met by the State and Its Subgrantees? Participation of Students Enrolled in Private Schools § 76.659 Use of public school personnel. A subgrantee may use program funds to make public personnel...

  18. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  19. Save medical personnel's time by improved user interfaces.

    Science.gov (United States)

    Kindler, H

    1997-01-01

    Common objectives in the industrial countries are the improvement of quality of care, clinical effectiveness, and cost control. Cost control, in particular, has been addressed through the introduction of case mix systems for reimbursement by social-security institutions. More data is required to enable quality improvement, increases in clinical effectiveness and for juridical reasons. At first glance, this documentation effort is contradictory to cost reduction. However, integrated services for resource management based on better documentation should help to reduce costs. The clerical effort for documentation should be decreased by providing a co-operative working environment for healthcare professionals applying sophisticated human-computer interface technology. Additional services, e.g., automatic report generation, increase the efficiency of healthcare personnel. Modelling the medical work flow forms an essential prerequisite for integrated resource management services and for co-operative user interfaces. A user interface aware of the work flow provides intelligent assistance by offering the appropriate tools at the right moment. Nowadays there is a trend to client/server systems with relational databases or object-oriented databases as repository. The work flows used for controlling purposes and to steer the user interfaces must be represented in the repository.

  20. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  1. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  2. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  3. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  4. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  5. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  6. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  7. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  8. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  9. Application of wireless sensor networks in personnel dosage monitoring system of nuclear power plant

    International Nuclear Information System (INIS)

    Chen Yonghong; Zhang Dafa; Jiang Wei; Chen Dengke

    2007-01-01

    Aim to meet the need of personnel dosage monitoring of nuclear power plant, a monitoring system was designed which based on wireless sensor network. First, the basic concept was described; the characteristics of the wireless sensor network applied in the monitoring system of nuclear power plant were also been analyzed; the structure of the system was built too. Finally, the special technologies like the choice of communication mode, the security of communication network and orientation that used in the monitoring system were discussed. (authors)

  10. IAEA activities on NPP personnel training and qualification

    International Nuclear Information System (INIS)

    Kossilov, A.

    1998-01-01

    Activities of IAEA concerning training and qualification of NPP personnel consider the availability of sufficient number of competent personnel which is one of the most critical requirements for safe and reliable NPP operation and maintenance. Competence of personnel is essential for reducing the frequency of events connected to human errors and equipment failures. The IAEA Guidebook on Nuclear Power Plant Personnel Training and its Evaluation incorporates the experience gained worldwide and provides recommendations on the use of SAT being the best practice for attaining and maintaining the qualification and competence of NPP personnel and for quality assurance of training

  11. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  12. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  13. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  14. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  15. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  16. Radiation monitoring data representation for duty personnel

    Energy Technology Data Exchange (ETDEWEB)

    Gavrilov, S.L.; Kiselev, V.P.; Krasnoperov, S.N.; Kudeshov, E.V.; Maslov, S.Y.; Semin, N.N.; Sirotinskiy, S.E.; Yakovlev, V.Y. [Nuclear Safety Institute of the Russian Academy of Sciences (NSI RAS), Moscow (Russian Federation)

    2014-07-01

    Currently, Web-GIS technologies are widely used to generate a reliable and intuitive web-based interface to monitor the current radiation situation in various regions of the Russian Federation. The developed 'Server Web-Monitoring' web-application is intended for duty personnel and can operate not only on desktop computers but also on mobile devices. The subsystem of duty personnel notification about any Off-Normal Situation (ONS) (such as: critical threshold exceedances or failures in operation of monitoring systems) is also considered in the paper. Three types of Automated Radiation Monitoring Systems (ARMS) are available for monitoring: - regional ARMS; - facility-level ARMS; - ARMS of nuclear power plant surveillance areas. Google Maps and Google Maps API toolbox are used as the cartographic basis. In the general-monitoring window only general information on each of the local systems is available. Next, the operator can move to monitoring of local ARMS he is interested in. The operator can either view a list of Radiation Situation Monitoring Posts (RSMP) showing the current data in the right frame or hide it and use the map only. Viewing the log of critical threshold exceedances for 24 hours and a report on all RSMPs of a given system over the last 7 days is also possible. The report contains maximum values of measurements for every day and for each RSMP. The developed web-application includes: - monitoring of the radiation situation and its changes on the general map of the Russian Federation and on maps of local ARMS; - displaying 7-day reports for all RSMPs of the selected ARMS; - displaying the log of critical threshold exceedances recorded over the past day. The notification subsystem informs duty personnel on all ONS, namely, on critical threshold exceedances in the incoming data and failures in operation of monitoring systems. The key features of the notification subsystem are: - round-the-clock functioning; - automatic notification in case of

  17. Studies in training nuclear plant personnel

    International Nuclear Information System (INIS)

    Hamlin, K.W.

    1987-01-01

    One of the lessons learned from the Three Mile Island (TMI) accident was that the nuclear industry was ineffective in learning from previous events at other plants. As training programs and methods have improved since TMI, the nuclear industry has searched for effective methods to teach the lessons learned from industry events. The case study method has great potential as a solution. By reviewing actual plant events in detail, trainees can be challenged with solving actual problems. When used in a seminar or discussion format, these case studies also help trainees compare their decision-making processes with other trainees, the instructor, and the personnel involved in the actual case study event

  18. Health of Australian atomic test personnel

    International Nuclear Information System (INIS)

    Donovan, J.

    1984-01-01

    This paper briefly summarises the results of a survey of the health of Australian personnel who took part in the U.K. atomic weapons tests between 1952 and 1957. The study identified indications of radiation exposure among participants and examined their health in relation to the answers they gave. For example, the study compared the health of those participants who said they cleaned up radioactive areas after tests with the health of those who said they had not. There was no excess of disease or death for any disease group studied in those members of the workforce who had film badge evidence of exposure to radiation

  19. Personnel hazards from medical electron accelerator photoneutrons

    International Nuclear Information System (INIS)

    McCall, R.C.; Jenkins, T.M.; Shore, R.A.; LaRiviere, P.D.

    1979-12-01

    For medical accelerators, neutron penetration through the room entry door is the major personnel hazard. Most therapy accelerator rooms are designed with at least a rudimentary maze to avoid the use of massive doors. Often, however, the maze may be similar to those shown in scale outline drawings of some medical electron accelerator rooms where the authors have made neutron measurements outside the doors which were of different thicknesses and compositions. The results are tabulated. It should be noted that there can be significant dose equivalents (H) at the door when a maze is inadequate, and that all three components - fast neutron, thermal neutron, and neutron capture γ rays - can be equally important

  20. Radiological response training for law enforcement personnel

    International Nuclear Information System (INIS)

    Maixner, R.D.

    1983-01-01

    A specialized training course for Nevada's law enforcement personnel has been conducted by Reynolds Electrical and Engineering Co., Inc. for the US Department of Energy since February 1981. This course is designed for those persons who are first to arrive at a transportation accident scene. The course provides a basic understanding of radiation protection, the prevention of contamination spread from the accident site, use of radiation detection equipment, and decontamination procedures. The Department of Energy's Nevada Operations Office provides the training at no cost to Nevada agencies. Each agency selects its attendees. Details of the course are given

  1. The Seibersdorf TL Personnel Dosimetry Service

    International Nuclear Information System (INIS)

    Duftschmid, K.E.

    1994-11-01

    Since 1976 the Department for Radiation Protection of the Austrian Research Centre Seibersdorf has been operating a TLD Personnel Monitoring Service, which presently covers about 18,000 radiation workers in Austria, with monthly monitoring periods. We have been the first accredited monitoring service in Europe, which fully converted from film dosimetry to TLD. From the beginning up to 1991 the service was based on three automated TLD systems Model 2271 from HARSHAW, USA. After extensive testing and comparisons, since almost four years now, the monitoring service has been operating on two HARSHAW 8800 systems, which are described in more detail below. (author)

  2. Training and Certification of Research Reactor Personnel

    International Nuclear Information System (INIS)

    Zarina Masood

    2011-01-01

    The safe operation of a research reactor requires that reactor personnel be fully trained and certified by the relevant authorities. Reactor operators at PUSPATI TRIGA Reactor underwent extensive training and are certified, ever since the reactor first started its operation in 1982. With the emphasis on enhancing reactor safety in recent years, reactor operator training and certification have also evolved. This paper discusses the changes that have to be implemented and the challenges encountered in developing a new training programme to be in line with the national standards. (author)

  3. The Seibersdorf TL Personnel Dosimetry Service

    Energy Technology Data Exchange (ETDEWEB)

    Duftschmid, K E [Oesterreichisches Forschungszentrum Seibersdorf GmbH (Austria)

    1994-11-01

    Since 1976 the Department for Radiation Protection of the Austrian Research Centre Seibersdorf has been operating a TLD Personnel Monitoring Service, which presently covers about 18,000 radiation workers in Austria, with monthly monitoring periods. We have been the first accredited monitoring service in Europe, which fully converted from film dosimetry to TLD. From the beginning up to 1991 the service was based on three automated TLD systems Model 2271 from HARSHAW, USA. After extensive testing and comparisons, since almost four years now, the monitoring service has been operating on two HARSHAW 8800 systems, which are described in more detail below. (author).

  4. Going beyond "highly-qualified personnel" to "value-added personnel"

    Science.gov (United States)

    Nantel, Marc; Fox, Bradley; Gelsthorpe, Leanne; Hamilton, Roxy; Marshall, Robert; Williamson, Guida

    2005-10-01

    Employers clamour for more "Highly-Qualified Personnel" (HQP) to hire, and photonics is no exception. The challenge facing all new graduates lies in what actually constitutes a Highly-Qualified Person. Yesterday, an HQP was often understood to be a graduate with a Bachelor's, Master's or Ph.D. degree. Today, industry is demanding that an HQP be either a university or college graduate with strong academic standing AND a sound business and communications skill set. In this paper, we introduce the concept of "Value-Added Personnel" (VAP), which marries both scientific and "soft-skills" aspects, and we present a new program in Ontario to produce VAPs.

  5. Best Practices for the Security of Radioactive Materials

    International Nuclear Information System (INIS)

    Coulter, D.T.; Musolino, S.

    2009-01-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass

  6. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  7. Development of NPP personnel training system in Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Tarykin, V. [Operation Personnel Training Department, Khmelnitsky NPP, Training Center, Neteshin 30100, Khmelnitsky region (Ukraine)]. E-mail: tarykinv@ukr.net

    2005-07-01

    Modern personnel training and retraining system is a guarantee of NPPs safe reliable operation. Since the time when independence of Ukraine was proclaimed personnel training system was created directly at NPPs. This system is based on the latest legislation framework, developed subject to IAEA recommendations, gained international experience in the field of personnel training in view of increased demands to personnel qualification. Training Centers, formed at each plant, form one of the main components of NPP personnel training. Personnel training at Training Centers is performed in accordance with standard programmes. Simulator training base was created by joint efforts of specialists from the USA, Russia and Ukraine. Establishing manager training system and replacement reserves for National Nuclear Energy Generating Company 'ENERGOATOM' (NNEGC 'ENERGOATOM') managerial personnel, including training programme and training materials development, teacher selection and training, is under way. (author)

  8. Conditions for selection, training and placement of personnel

    International Nuclear Information System (INIS)

    Chrkavy, L.

    1983-01-01

    Methods applied in the choice of personnel include: the assessment of personnel files, references, interviews, examinations, long-term observation of the respective person. Investment intents go hand in hand with the concept of labour demands. The planned employment of personnel takes place from the very beginning of the construction of the power plant. At the Bohunice V-1 nuclear power plant 23 university graduates, 29 secondary school graduates and 64 graduates of vocational schools were employed every year. Social measures and complex care are being implemented. Personnel is being selected also on the basis of an assessment of their psychic qualities which are very important in view of the high personal and social responsibility of nuclear power plant personnel. The high technical standard of the equipment places high demands on the education level of all personnel, high demands on training, high remuneration and high level of allround care of personnel. (M.D.)

  9. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  10. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  11. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  12. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  13. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  14. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  15. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  16. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  17. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  18. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  19. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  20. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  1. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  2. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  3. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  4. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  5. Lethal stakes: rig-hand killings show rising security risks abroad

    International Nuclear Information System (INIS)

    Lorenz, A.

    1999-01-01

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards

  6. Lethal stakes: rig-hand killings show rising security risks abroad

    Energy Technology Data Exchange (ETDEWEB)

    Lorenz, A

    1999-05-03

    The increasing demands for protection money from foreign exploration and pipeline construction companies by left-wing guerrilla groups in various South American countries led to greater attention being focused on security services. This paper discusses the various alternatives to consider when choosing a security service. The experience of a Canadian pipeline company with projects in South America, and in need of security services, is described. The company felt that it was important that the security firm have a Calgary presence. It ended up hiring Calgary Protection Concepts Corporation, which is run by former Canadian police and intelligence officers, who provide a wide range of security services. Staff spend time in the country involved to look over the local security situation, develop contacts with local intelligence officers, and contract overseas agents who arrange for bodyguards, escorts and armored cars. ProCon also helps companies develop crisis management plans, guiding senior personnel through scenarios such as kidnapping, extortion and civil strife. ProCon also has a 24-hour emergency assistance call centre to provide immediate advice, to notify personnel and family members and to monitor the situation. Trust is key to hiring an outside security service since the security firm becomes party to extremely confidential information. Top security firms usually specialize in either security work or political risk analysis, but not both. The reason for this is that there are big differences in mentality, training and capabilities between studying risks and actively guarding against hazards.

  7. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  8. Personnel and population exposure regulation questions

    International Nuclear Information System (INIS)

    Nosovskij, A.V.

    2000-01-01

    ICRP Recommendations-1990, Notice 60 was used as a basis for new NRBU-97 norms in Ukraine and also for Russian NRB-96 and reviewed NRB-99. These recommendations caused negative treatment among rather authoritative organizations and individual scientists of France, USA, Russia and other countries. Till 1988, norms NRB-76/87 were operated in Ukraine. ICRP Recommendations-1976, Notice 26 was used under their development, and dosage limits included into them surely provided radiation protection for Nuclear Power Units personnel and population during long-term period. But some leaders being affected by Chernobyl syndrome and radio phobia put strong pressure upon ICRP that resulted in Notice 60 appearance where dosage limits for personnel and population were sufficiently understated without any scientific ground. According to literary sources survey, it is shown that usage of dose-effect non threshold linear dependence concept essentially exaggerates the real danger. According to the concept, principles of regulation the exposure standards are suggested, which considered to be actual as large-scale works on dismantling the reactors and ChNPP Units equipment are expected soon on the phase of their decommissioning and also the conducting of works on Unit 'Shelter' transformation into ecologically safe system

  9. Radiological protection of service and civilian personnel

    International Nuclear Information System (INIS)

    1990-01-01

    Since the United Kingdom's defence nuclear industry was founded in the late 1940s, Service and civilian personnel have been exposed to ionising radiation. During the last forty years, as knowledge about the effects of radiation exposure has grown, concern to ensure adequate protection against exposure has also increased,. As part of our continuing scrutiny of the Ministry of Defence (MoD), we have undertaken a short inquiry to examine MoD's current and future policy and practice on radiological protection. The principal work involving exposure of Service and civilian personnel to significant levels of radiation falls into two discrete areas: the nuclear weapons programme and the nuclear propulsion programme. The nuclear weapons programme involves research, the production of nuclear warheads and their deployment with Her Majesty's Forces. The nuclear propulsion programme involves research, production, operation, refitting and decommissioning of pressurised water reactors as a source of propulsion power in Royal Navy submarines. These two nuclear programmes are not the only sources of ionising radiation within MoD's responsibility: it also arises from research, non-destructive testing and medical applications, most notably conventional radiography. In this Report we have concentrated upon ionising radiation arising from the two defence nuclear programmes. (author)

  10. A systematic approach to personnel neutron monitoring

    International Nuclear Information System (INIS)

    Griffith, R.V.; Hankins, D.E.

    1980-01-01

    In selection, calibration and interpretation of personnel neutron dosimeters used in radiation protection, adequate attention is often not given to matching the characteristics of the dosimeter with the quality of the neutron field. A particular concern is the use of albedo detectors which have little energy response similarity to the neutron dose equivalent conversion curve. At the Lawrence Livermore Laboratory we have developed a system for dosimeter calibration and neutron field characterization using Bonner spheres and remmeters. Rapid surveys of the work area with detectors in 3-in and 9-in polyethylene spheres establish a qualitative estimate of spectral variation found in the facility. We also use this data to determine the appropriate albedo dosimeter calibration factors. At several locations representing the spectral range, multisphere spectra measure-ments are made and the spectrum weighted dose equivalent rates calculated. These rates are compared with survey instrument results to establish correction factors for the relative over- or under-response expected from these instruments, particularly in highly moderated neutron fields where remmeters overrespond. We also use the spectral information to determine the appropriateness of dosimeters considered for future use. This technique has been applied at power reactors to provide information valuable to selection of proper personnel dosimeters. We find that the spectral range is sufficiently narrow that albedo detectors can be used with confidence. On the other hand, most of the dose occurs at energies below the effective threshold NTA film. (author)

  11. To all members of the personnel

    CERN Multimedia

    HR Department

    2011-01-01

    Summer work for children of members of the personnel During the period from 13 June to 16 September 2011 inclusive, there will be a limited number of jobs for summer work at CERN (normally unskilled work of a routine nature), which will be made available to children of members of the personnel (i.e. anyone holding an employment or association contract with the Organization). Candidates must be aged between 18 and 24 inclusive on the first day of the contract, and must have insurance coverage for both illness and accident. The duration of all contracts will be 4 weeks and the allowance will be 1717 CHF for this period. Candidates should apply via the HR Department’s electronic recruitment system (E-rt): https://ert.cern.ch/browse_intranet/wd_pds?p_web_site_id=1&p_web_page_id=8886&p_no_apply=&p_show=N Completed application forms must be returned by 11 April 2011 at the latest. The results of the selection will be available by the end of May 2011. For further information, please con...

  12. TO ALL MEMBERS OF THE PERSONNEL

    CERN Document Server

    2001-01-01

    During the period mid-June to mid-September 2001, there will be a limited number of vacancies for temporary work at CERN (normally unskilled work of a routine nature) which will be made available to children of members of the personnel (that is, anyone holding an employment or association contract with CERN). It should be noted that candidates must be aged between 18 and 24 inclusive on the first day of the contract, and that they must have insurance cover for both illness and accident. In view of the limited number of vacancies available, no children previously appointed at CERN under this scheme can be considered. The duration of all appointments will be 4 weeks, the allowance being CHF 1538.- net for this period. Application forms can be obtained via the Web at the following address: http://cern.web.cern.ch/CERN/Divisions/PE/ under the heading 'Other Useful Links' or from Paula Barriere, Personnel Management Group (by using the slip below or by electronic mail to Paula.Barriere@.cern.ch). Completed applic...

  13. Whole body personnel monitoring via ionization detection

    International Nuclear Information System (INIS)

    Koster, J.E.; Bounds, K.A.; Kerr, P.L.; Steadman, P.A.; Whitley, C.R.

    1998-02-01

    A project between Fernald EMP and LANL is to field a monitor for the detection of alpha-emitting contamination on a human body. Traditional personnel monitoring for alpha emitters involves either frisking with a probe or pressing against large detectors in order to overcome the short range of alpha particles. These methods have a low alpha collection efficiency, and can miss contamination on less accessible surfaces. The authors have investigated the sensitivity and practicality of measuring the entire subject simultaneously using the technique of ionization monitoring. The goal is to create a booth that personnel step into quickly during egress from radiological facilities. The detection technique relies on a breeze of air passing over the subject. Alpha emission produces copious ions in the ambient air which are transported by the air current to an ion collector, resulting in a small electrical current proportional to the amount of contamination. Results indicate a conservative sensitivity of 3,000 disintegrations per minute localized to one of five areas of the body in a measurement lasting less than 2 minutes

  14. Trust versus confidence: Microprocessors and personnel monitoring

    International Nuclear Information System (INIS)

    Chiaro, P.J. Jr.

    1993-01-01

    Due to recent technological advances, substantial improvements have been made in personnel contamination monitoring. In all likelihood, these advances will close out the days of manually frisking personnel for radioactive contamination. Unfortunately, as microprocessor-based monitors become more widely used, not only at commercial power reactors but also at government facilities, questions concerning their trustworthiness arise. Algorithms make decisions that were previously made by technicians. Trust is placed not in technicians but in machines. In doing this it is assumed that the machine never misses. Inevitably, this trust drops, due largely to open-quotes false alarms.close quotes This is especially true when monitoring for alpha contamination. What is a open-quotes false alarm?close quotes Do these machines and their algorithms that we put our trust in make mistakes? An analysis was performed on half-body and hand-and-foot monitors at Oak Ridge National Laboratory (ORNL) in order to justify the suggested confidence level used for alarm point determination. Sources used in this analysis had activities approximating ORNL's contamination limits

  15. Trust versus confidence: Microprocessors and personnel monitoring

    International Nuclear Information System (INIS)

    Chiaro, P.J. Jr.

    1993-01-01

    Due to recent technological advances, substantial improvements have been made in personnel contamination monitoring. In all likelihood, these advances will close out the days of manually frisking personnel for radioactive contamination. Unfortunately, as microprocessor-based monitors become more widely used, not only at commercial power reactors but also at government facilities, questions concerning their trustworthiness arise. Algorithms make decisions that were previously made by technicians. Trust is placed not in technicians but in machines. In doing this it is assumed that the machine never misses. Inevitably, this trust drops, due largely to ''false alarms''. This is especially true when monitoring for alpha contamination. What is a ''false alarm''? Do these machines and their algorithms that we put our trust in make mistakes? An analysis was performed on half-body and hand-and-foot monitors at Oak Ridge National Laboratory (ORNL) in order to justify the suggested confidence level used for alarm point determination. Sources used in this analysis had activities approximating ORNL's contamination limits

  16. Methacrylate and acrylate allergy in dental personnel.

    Science.gov (United States)

    Aalto-Korte, Kristiina; Alanko, Kristiina; Kuuliala, Outi; Jolanki, Riitta

    2007-11-01

    Methacrylates are important allergens in dentistry. The study aimed to analyse patch test reactivity to 36 acrylic monomers in dental personnel in relation to exposure. We reviewed the test files at the Finnish Institute of Occupational Health from 1994 to 2006 for allergic reactions to acrylic monomers in dental personnel and analysed the clinical records of the sensitized patients. 32 patients had allergic reactions to acrylic monomers: 15 dental nurses, 9 dentists, and 8 dental technicians. The dentists and dental nurses were most commonly exposed to 2-hydroxyethyl methacrylate (2-HEMA), triethyleneglycol dimethacrylate (TREGDMA), and 2,2-bis[4-(2-hydroxy-3-methacryloxypropoxy) phenyl]propane (bis-GMA). 8 dentists and 12 dental nurses were allergic to 2-HEMA. The remaining dentist was positive to bis-GMA and other epoxy acrylates. The remaining 3 dental nurses reacted to diethyleneglycol diacrylate (DEGDA) or triethyleneglycol diacrylate (TREGDA), but not to monofunctional and multifunctional methacrylates. Our dental technicians were mainly exposed and sensitized to methyl methacrylate (MMA) and ethyleneglycol dimethacrylate (EGDMA). 1 technician reacted only to 2-HEMA, and another to ethyl methacrylate (EMA) and ethyl acrylate (EA). 2-HEMA was the most important allergen in dentists and dental nurses, and MMA and EGDMA in dental technicians. Reactions to bis-GMA, DEGDA, TREGDA, EMA and EA were relevant in some patients.

  17. Experience of TLD personnel monitoring laboratory

    International Nuclear Information System (INIS)

    Jakhete, Prashant

    2002-01-01

    Full text: Renentech Laboratories is the first Private Enterprise in India to have been chosen to provide Personnel radiation monitoring services to radiation workers at different parts of the country. Since 1992 the Company has been manufacturing TLD phosphor powder of requisite quality and from 1995 commenced the production of TLD cards for radiation monitoring. After getting the necessary approval from the competent authorities in the country, the company undertook a rigorous quality assurance programme and received the accreditation in 1999 to carry out the personnel monitoring of radiation. Since then the trained staff of the Company is covering 1200 institutions in 16 states where radiation is being used. This translates to processing of 60,000 Till cards annually, the maximum limit permitted by BARC. Processing of exposure data is done strictly according well-laid guidelines. Any cases of overexposure are immediately referred to Calibration and Dose Record Section of BARC to meet the regulatory requirements. Necessary procedural guidelines are followed to handle such cases. In this lecture, learning, operation and implementation experience of a typical Private Company in a task, which, hitherto had been regarded as exclusive responsibility of state owned institution, is enumerated

  18. Characterization of a thermoluminiscence personnel dosimetry system

    International Nuclear Information System (INIS)

    Vazquez Lopez, C.; Saez, J.C.; Labarta, T.

    1989-01-01

    Various tests carried out to characterize a Thermoluminiscence Personnel Dosimetry Automatic System, based on the optical heating of a multielement dosemeter are presented. The dosemeter consists of Lithium Borate (Copper) and Calcium Sulphate (Thallium) phosphors. The Dosimetric System shows some outstanding features, such as its simplicity (no aditional annealing procedures are required), its short reading cycle (160 TLD per hour and its data handling capabilities (RS-232C and Parallel Printer digital ports and four analigic outputs for Glow Curve Adquisition). The tests performed have been designed to conform with the different existing international Standards and Recommendations (ANSI: N13.11-1983; IEC:Draft 45B-1987, ISO:DP 8034-1984) The new radiological quantities (I.C.R.U.-19855) have been used for calibration. The results obtained (linearity, repeatibility, detection threshold, residue, stability of stored information, etc) show the optimum performance of this dosimetric system in its aplication to routine personnel dose monitoring. Based on the dosemeter energy discriminating response, an algorithm for dose assesment has been developed. The method allows personal dose calculations within 10% and gives valuable information on the quality and energy of incident radiation, for photons from 30 to 2000 keV and for Beta penetrating radiation (Sr/Y, U). (Author)

  19. To all members of the personnel

    CERN Multimedia

    HR Department

    2009-01-01

    Temporary work for children of members of the personnel During the period from 15 June to 11 September 2009 inclusive, there will be a limited number of jobs for temporary work at CERN (normally unskilled work of routine nature), which will be made available to children of members of the personnel (i.e. anyone holding an employment or association contract with the Organization). Candidates must be aged between 18 and 24 inclusive on the first day of the contract, and must have insurance coverage for both illness and accident. The duration of all appointments will be 4 weeks and the allowance will be CHF 1717. - for this period. Candidates should apply via HR Department’s electronic recruitment system (E-rt): https://ert.cern.ch/browse_www/wd_pds?p_web_page_id=6970 Completed application forms must be returned by 10 April 2009 at the latest. The results of the selection will be available on 22 May 2009. For further information, please contact: mailto:Inger.Carriero@cern.c...

  20. To all members of the personnel

    CERN Multimedia

    HR Department

    2009-01-01

    Temporary work for children of members of the personnel During the period from 15 June to 11 September 2009 inclusive, there will be a limited number of jobs for temporary work at CERN (normally unskilled work of a routine nature), which will be made available to children of members of the personnel (i.e. anyone holding an employment or association contract with the Organization). Candidates must be aged between 18 and 24 inclusive on the first day of the contract, and must have insurance coverage for both illness and accident. The duration of all appointments will be 4 weeks and the allowance will be CHF 1717. - for this period. Candidates should apply via the HR Department’s electronic recruitment system (E-rt): https://ert.cern.ch/browse_www/wd_pds?p_web_page_id=6970 Completed application forms must be returned by 10 April 2009 at the latest. The results of the selection will be available on 22 May 2009. For further information, please contact: mailto:Inger.Carriero@...